Comprehensive Analysis of Malevolent Attacks and security Challenges in Unauthorized Access to IoT Devices

Author: Jammana Lalu Prasad, C Sushama, Kavitha Chekuri Journal of Mobile Computing, Communications & Mobile Networks-STM Journals Issn: 2349-901X Date: 2023-12-01 10:06 Volume: 10 Issue: 02 Keyworde: Malevolent attack, unauthorized access, data breach, Man-in-the-Middle attack, botnet, cyber-attacks Full Text PDF Submit Manuscript Journals


Keyworde: Malevolent attack, unauthorized access, data breach, Man-in-the-Middle attack, botnet, cyber-attacks

Full Text PDF


1. Colin Tankard, Digital Pathways. The security issues of the Internet of Things. Comput Fraud
Secur. 2015 Sep; 2015(9): 11–14.
2. Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D. Unlocking the potential
of the Internet of Things. McKinsey Global Institute; 2015 Jun. Accessed Aug 2015.
3. OWASP. Internet of Things Top 10 Projects. [Online]. OWASP.AccessedAug2015.
4. Alshanbari HS. Medical image watermarking for ownership & tamper detection. Multimed Tools
Appl. 2021; 80(11): 16549–16564.
5. Arpacı B, Kurt E, Çelik K, Ciylan B. Colored image encryption and decryption with a new
algorithm and a Hyperchaotic electrical circuit. J Electr Eng Technol. 2020; 15(21): 1413–1429.
6. Banu SA, Amirtharajan R. A robust medical image encryption in dual domain: chaos-DNA-IWT
combined approach. Med Biol Eng Comput. 2020; 58(7): 1445–1458.
7. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L. A survey of lightweight-cryptography
implementations. IEEE Des Test. 2007; 24(6): 522–533
8. Gupta M, Gupta KK, Shukla PK. Session key-based fast, secure and lightweight image encryption
algorithm. Multimed Tools Appl. 2021; 80(10): 10391–10416.
9. Koo WK, Lee H, Kim YH, Lee DH. Implementation and analysis of new lightweight cryptographic
algorithm suitable for wireless sensor networks. In 2008 IEEE international conference on
information security and assurance (Isa 2008). 2008 Apr; 73–76.
10. Liu B, Li Y, Zeng B, Lei C. An efficient trust negotiation strategy towards the resource-limited
mobile commerce environment. Front Comput Sci. 2016; 10(3): 543–558.
11. Khan S, Ibrahim MS, Khan KA, Ebrahim M. Security analysis of secure force algorithm for
wireless sensor networks. ArXiv preprint arXiv:1509.00981. 2015.
12. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS. A multidimensional chaotic image encryption
algorithm based on the region of interest. Multimed Tools Appl. 2020; 79(25–26): 17669–17705.
13. Milad AA, Muda HZ, Noh ZA, Algaet MA. Comparative study of performance in cryptography
algorithms (blowfish and Skipjack). J Comput Sci. 2012; 8(7): 1191–1197.
14. Weber Lauren. Go ahead, hit the snooze button. Wall St J. 2013 Jan 23.
15. Ubl Stephen J. Public policy implications for using remote monitoring technology to treat diabetes.
J Diabetes Sci Technol. 2007 May; 1(3): 436–9.

If-Else Example