Explore chapters and articles related to this topic
Machine Learning for Enhancement of Security in Internet of Things Based Applications
Published in Syed Rameem Zahra, Mohammad Ahsan Chishti, Security and Privacy in the Internet of Things, 2020
Sparsh Sharma, Faisal Rasheed Lone, Mohd Rafi Lone
In passive attacks, the attacker passively gathers the sensitive network information by eavesdropping the network. This type of attack is difficult to detect and mitigate, because the attacker doesn’t actively inject any malicious packet or information into the network to acqu24ire the network`s information. The passive attack works by eavesdropping the communication channel or network information. Making use of cryptographic techniques and encryption of the traffic is one way to deal with passive attacks. A passive attack is usually an attack on the confidentiality goal of the network and can be used to extract sensitive information like a patient`s medical records, login credentials, etc. Passive attacks can be used for information gathering for performing various other active attacks.
Role of Cryptography and Its Challenges in Integrating Secured IoT Products
Published in S. Velliangiri, Sathish A. P. Kumar, P. Karthikeyan, Internet of Things, 2020
D. Citharthan, M. Varatharaj, D. Palanivel Rajan
According to the Attack landscape H1 2019 report, the number of network attack events measured between January and June was twelve times higher when compared to the same period in 2018, an increase mostly driven by IoT-related traffic. Attacks in the network will be performed by network attackers or unauthorized persons, where they will access the data or modifies the data or even destroys the data. In network, the attacks are classified into the passive attacks and active attacks. In a passive attack, the data will not be modified, whereas, in most of the active attacks, the data will be modified during transmission. There are two techniques in passive attack, namely “release of the contents” where the third-party will access the data sent between the sender and the receiver without any modifications and ‘traffic analysis' where the third-party observes the traffic flow between the sender and the receiver. Here data will not be modified, and so the above techniques are called eavesdropping techniques. There are four types of active attacks, namely masquerade attack, replay attack, data modification, and denial of service. In the masquerade attack, the third-party/unauthorized person will send the data to the receiver in the name of the sender. In a replay attack, the third-party/unauthorized person will access the data and again sends the same data to the receiver. In data modification, the third-party/unauthorized person will access the data and sends the modified data to the receiver. In denial of service, the third-party/unauthorized person will deny the service to the authorized person. To avoid the attacks in network, it is necessary to provide network security services for any IoT product.
Cryptographic Attacks, Impacts and Countermeasures
Published in Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan, Security Analytics for the Internet of Everything, 2020
Hazaa Al Fahdi, Mohiuddin Ahmed
The attackers can apply passive or active attacks on a target to get some information about it. The passive attack is playing a sensitive role to obtain information on a system or user device without authorization to access. Also, the passive attack does not affect the systems resources, but affects the data’s confidentiality, for example, eavesdropping on two parties’ communication channel. This is done without the two parties knowing which usually leads to stealing the information [7].
Watchdog malicious node detection and isolation using deep learning for secured communication in MANET
Published in Automatika, 2023
Narmadha A. S., Maheswari S., Deepa S. N.
Mobile Adhoc Networks are vulnerable to numerous security attacks. The security attacks in MANET are categorized based on varied sole aspects. In MANET, it has separated into active and passive attacks. The attack in which the authorized node (attacker) changes or destroys the information and it is communicated in the network is termed as Active attack. Types of active attack such as Black hole Attack, Denial of service (DoS) attack, Worm hole Attack, Grey hole Attacks and so on. The attack in which an unauthorized node obtains the data without disturbing the network operation is named a passive attack. These types of attacks are Traffic Monitoring, Traffic Analysis and Eavesdropping. However, MANETs are highly vulnerable to various security attacks due to their inherent characteristics. Hence, to address the issue, AODV is utilized for MANET for discovering the communication route from the source to the destination node. This protocol establishes routes to destinations on demand and supports both unicast and multicast routing with higher attack detection rate, minimum delay and time.