Comprehensive Analysis of Malevolent Attacks and security Challenges in Unauthorized Access to IoT Devices
Abstract
This study provides an in-depth exploration of malevolent attacks targeting Internet of Things (IoT)
devices and the associated security issues stemming from unauthorized access. It presents a detailed
examination of different types of attacks, including data theft, device malfunctions, and the
dissemination of false results. The study also addresses the security concerns raised by unauthorized
attacks and proposes effective solutions. Furthermore, it offers comprehensive insights into
safeguarding IoT devices and data, presenting advanced preventive measures to counter malevolent
and unauthorized attacks.
Keywords: Malevolent attack, unauthorized access, data breach, Man-in-the-Middle attack, botnet,
cyber-attacks
INTRODUCTION
The increased susceptibility of an Internet-of-Things network to malicious assaults is one of the main
difficulties. Numerous academics have noted that heterogeneity, operation in an open environment,
scalability, limitations of IoT devices, resource limitations, high-security deployment, and operational
expenses are the principal issues in the security of the World Wide Web of Things. The interconnected nature of an IoT network makes it extremely vulnerable to unwanted attacks and allows for easy data sharing and communication between devices [1]. These attacks can take several different forms, such as network hijacking to seize control of devices, getting unauthorized access to sensitive data, or data breaches where private information is made public due to insufficient security measures.
Keyworde: Malevolent attack, unauthorized access, data breach, Man-in-the-Middle attack, botnet, cyber-attacks
Full Text PDF
Refrences:
1. Colin Tankard, Digital Pathways. The security issues of the Internet of Things. Comput Fraud
Secur. 2015 Sep; 2015(9): 11–14.
2. Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D. Unlocking the potential
of the Internet of Things. McKinsey Global Institute; 2015 Jun. Accessed Aug 2015.
www.mckinsey.com/insights/business_technology/the_Internet_of_things_the_value_of_digitizin
g_the_physical_world.
3. OWASP. Internet of Things Top 10 Projects. [Online]. OWASP.AccessedAug2015.
www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project.
4. Alshanbari HS. Medical image watermarking for ownership & tamper detection. Multimed Tools
Appl. 2021; 80(11): 16549–16564. https://doi.org/10.1007/s11042-020-08814-9
5. Arpacı B, Kurt E, Çelik K, Ciylan B. Colored image encryption and decryption with a new
algorithm and a Hyperchaotic electrical circuit. J Electr Eng Technol. 2020; 15(21): 1413–1429.
6. Banu SA, Amirtharajan R. A robust medical image encryption in dual domain: chaos-DNA-IWT
combined approach. Med Biol Eng Comput. 2020; 58(7): 1445–1458.
7. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L. A survey of lightweight-cryptography
implementations. IEEE Des Test. 2007; 24(6): 522–533
8. Gupta M, Gupta KK, Shukla PK. Session key-based fast, secure and lightweight image encryption
algorithm. Multimed Tools Appl. 2021; 80(10): 10391–10416. https://doi.org/10.1007/s11042-020-
10116-z
9. Koo WK, Lee H, Kim YH, Lee DH. Implementation and analysis of new lightweight cryptographic
algorithm suitable for wireless sensor networks. In 2008 IEEE international conference on
information security and assurance (Isa 2008). 2008 Apr; 73–76.
10. Liu B, Li Y, Zeng B, Lei C. An efficient trust negotiation strategy towards the resource-limited
mobile commerce environment. Front Comput Sci. 2016; 10(3): 543–558.
11. Khan S, Ibrahim MS, Khan KA, Ebrahim M. Security analysis of secure force algorithm for
wireless sensor networks. ArXiv preprint arXiv:1509.00981. 2015.
12. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS. A multidimensional chaotic image encryption
algorithm based on the region of interest. Multimed Tools Appl. 2020; 79(25–26): 17669–17705.
https://doi.org/10.1007/s11042-020-08645-8.
13. Milad AA, Muda HZ, Noh ZA, Algaet MA. Comparative study of performance in cryptography
algorithms (blowfish and Skipjack). J Comput Sci. 2012; 8(7): 1191–1197.
14. Weber Lauren. Go ahead, hit the snooze button. Wall St J. 2013 Jan 23.
15. Ubl Stephen J. Public policy implications for using remote monitoring technology to treat diabetes.
J Diabetes Sci Technol. 2007 May; 1(3): 436–9.