A Survey on Security Attacks and Solutions in the IoT Network.
Xingwei LiangYoohwan KimPublished in: CCWC (2021)
Keyphrases
- buffer overflow
- security threats
- security problems
- cyber attacks
- security measures
- fault injection
- computer networks
- intrusion detection and prevention
- intrusion prevention
- denial of service attacks
- security mechanisms
- traffic analysis
- key management
- denial of service
- security issues
- dos attacks
- network security
- java card
- intrusion detection
- countermeasures
- security risks
- malicious traffic
- security protocols
- network traffic
- network attacks
- computer security
- management system
- malicious nodes
- information security
- security management
- forensic analysis
- wireless sensor networks
- security vulnerabilities
- security breaches
- cloud computing
- intrusion detection system
- data corruption
- data security
- access control
- network administrators
- network management
- cyber security
- chosen plaintext
- biometric template
- attack scenarios
- wireless networks
- stream cipher
- virtual private network
- resource constrained