Internet of Things (IoT) devices may transfer data to the gateway/application server through File... more Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endang...
2011 IEEE International Conference on Communications (ICC), 2011
In this paper, we investigate the effects of routing loop, sinkhole, and wormhole attacks on the ... more In this paper, we investigate the effects of routing loop, sinkhole, and wormhole attacks on the position-based routing (PBR) in vehicular ad hoc networks (VANETs). We also introduce a new attack termed wormhole-aided sybil attack on PBR. Our study indicates that the wormhole-aided sybil attack has the worst impact on the packet delivery in PBR. To ensure the reliability of PBR in VANETs, we propose a set of plausibility checks that can mitigate the impact of these PBR attacks. The proposed plausibility checks do not require adding extra hardware to the vehicles. In addition, they can adapt to different road characteristics and traffic conditions. Simulation results are given to demonstrate that the proposed plausibility checks are able to efficiently mitigate the impact of the previously mentioned PBR attacks.
Internet of Things (IoT) devices may transfer data to the gateway/application server through File... more Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endang...
2011 IEEE International Conference on Communications (ICC), 2011
In this paper, we investigate the effects of routing loop, sinkhole, and wormhole attacks on the ... more In this paper, we investigate the effects of routing loop, sinkhole, and wormhole attacks on the position-based routing (PBR) in vehicular ad hoc networks (VANETs). We also introduce a new attack termed wormhole-aided sybil attack on PBR. Our study indicates that the wormhole-aided sybil attack has the worst impact on the packet delivery in PBR. To ensure the reliability of PBR in VANETs, we propose a set of plausibility checks that can mitigate the impact of these PBR attacks. The proposed plausibility checks do not require adding extra hardware to the vehicles. In addition, they can adapt to different road characteristics and traffic conditions. Simulation results are given to demonstrate that the proposed plausibility checks are able to efficiently mitigate the impact of the previously mentioned PBR attacks.
Uploads
Papers