Combating Man-in-the-Middle Attacks within IoT Systems
Author(s): OATU, Laura
Author(s) keywords: blacklist, cyber-attacks, IoT, Man-in-the-middle, whitelist
Reference keywords: cyber attack, cyber security, IoT
Abstract:
In the last few years, the number of internet-connected devices has grown significantly, from smart washing machines and other electrical appliances to baby monitors. Along with this growth, the number of cyber-attacks has also increased. That's why cyber security is more important than ever. Personal data being a very precious resource and at the same time a very powerful tool. The present article aims to bring a new implementation of information security methods against attacks such Man-in-the-Middle without affecting the performance of the devices and without making everyday use difficult.
References:
[1]. A. S. Gillis, "What is the internet of things," March 2022. [Online]. Available: https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT.
[2]. E. Lacey, "Wired," 17 August 2021. [Online]. Available: https://www.wired.com/story/kalay-iot-bug-video-feeds/.
[3]. J. Melnick, "Netwrix," 15 May 2018 . [Online]. Available: Top 10 Most Common Types of Cyber Attacks.
[4]. D. Lom, 29 Jan 2014. [Online]. Available: https://www.nbcnews.com/tech/security/houston-couples-baby-monitor-hacked-used-watch-infant-n18531.
[5]. 2019, Internet of things (IoT) security threats and concerns worldwide as of late, 31 Mar 2023. [Online]. Available: https://www.statista.com/statistics/1202640/internet-of-things-security-concerns/.
[6]. Waveshare ESP32-CAM, Feb 2018. [Online]. Available: https://www.aliexpress.com/item/4000000845941.html?pdp_npi=2%40dis%21USD%2114.99%2113.64%21%21%21%21%21%40211675c516823574806677280ec6d3%2110000000000411791%21affd&dp=571088-102596.73329037&aff_fcid=4c7664f0b4944d619c5a690cf029896b-1682357481040-00390&aff.
[7]. CAM esp32, [Online]. Available: https://makerselectronics.com/product/esp32-cam-mb-micro-usb-download-module-for-esp32-cam.
Article Title: Combating Man-in-the-Middle Attacks within IoT Systems
Author(s): OATU, Laura
Date of Publication: 2024-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2024.01.05
Issue: Volume 13, Issue 1, Year 2024
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 59-65 (7 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.