MAN-IN-THE-MIDDLE ATTACKS AND INTERNET OF THINGS
Journal: FBIM Transactions (Vol.V, No. 2)Publication Date: 2017-07-15
Authors : Zoran Cekerevac; Zdenek Dvorak; Ludmila Prigoda; Petar Cekerevac;
Page : 18-28
Keywords : Internet of things; man-in-the-middle; Internet eavesdropping;
Abstract
A rapid development of computers and computer software are some of the causes of the security vulnerabilities that allow attackers to successfully carry out attacks on information systems of their users. The massive spread of the Internet of Things will make a greater difference between the current understanding of the Internet, which is reflected in the "dot-com", "social networks" and web of "experience", and the new Internet that will enable new and revolutionary applications with the potential to significantly improve the quality of life. Given that different devices have come with embedded computer components and connectivity to the Internet, and the possibilities of mutual communication, it is realistic they will be exposed to some variants of attacks that have been seen in practice so far. This paper analyzes some aspects of the "man in the middle" attacks related to the Internet of things. After a short introductory presentation on the Internet of things and "man-in-the-middle" attack, the paper presents the technology of this attack, as well as the benefits that an attacker could have from a successful attack. Also, here are shown some known examples of successful attacks, the economic consequences of such attacks, as well as some of the ways of protection against these and similar attacks. The conclusion shows the summary of the whole analysis together with the assumptions on the future development of the Internet of things and the possible attacks on the connected devices.
Other Latest Articles
- AGRARIAN REFORM IN RUSSIA IN THE NINETEENTH CENTURY AND ITS IMPACT ON THE RUSSIAN ECONOMY
- BASIC POSTULATES OF BUDGET POLICY ON THE EXAMPLE OF EUROPEAN UNION AND THE REPUBLIC OF SERBIA
- FOREIGN ECONOMIC ACTIVITY OF REGION AS FACTOR OF ECONOMIC SECURITY
- Delay Analysis in EPC Projects using Ishikawa Diagram
- Evaluation of Flexible Pavement Failures-A Case Study on Izki Road
Last modified: 2017-07-14 00:54:41