ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MAN-IN-THE-MIDDLE ATTACKS AND INTERNET OF THINGS

Journal: FBIM Transactions (Vol.V, No. 2)

Publication Date:

Authors : ; ; ; ;

Page : 18-28

Keywords : Internet of things; man-in-the-middle; Internet eavesdropping;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A rapid development of computers and computer software are some of the causes of the security vulnerabilities that allow attackers to successfully carry out attacks on information systems of their users. The massive spread of the Internet of Things will make a greater difference between the current understanding of the Internet, which is reflected in the "dot-com", "social networks" and web of "experience", and the new Internet that will enable new and revolutionary applications with the potential to significantly improve the quality of life. Given that different devices have come with embedded computer components and connectivity to the Internet, and the possibilities of mutual communication, it is realistic they will be exposed to some variants of attacks that have been seen in practice so far. This paper analyzes some aspects of the "man in the middle" attacks related to the Internet of things. After a short introductory presentation on the Internet of things and "man-in-the-middle" attack, the paper presents the technology of this attack, as well as the benefits that an attacker could have from a successful attack. Also, here are shown some known examples of successful attacks, the economic consequences of such attacks, as well as some of the ways of protection against these and similar attacks. The conclusion shows the summary of the whole analysis together with the assumptions on the future development of the Internet of things and the possible attacks on the connected devices.

Last modified: 2017-07-14 00:54:41