A Denial of Service Attack Method for an IoT System

In recent years, Internet of things (IoT) is widely used in various domains. However, the security of the IoT system becomes a challenge. If the IoT system is attacked, a great property loss will happen. In this paper, a denial of service (DoS) attack to an IoT system is shown. The attack tool is Kali Linux, A Denial of Service (DOS) attack is launched by using 3 different methods. The comparison between the 3 DoS attack methods is also given.

[1]  Srdan Popic,et al.  Provided security measures of enabling technologies in Internet of Things (IoT): A survey , 2016, 2016 Zooming Innovation in Consumer Electronics International Conference (ZINC).

[2]  M. Matsumoto,et al.  A framework for disaster management system and WSN protocol for rescue operation , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[3]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[4]  Xin Huang,et al.  Privacy and Security Aware Home Sensor System , 2010 .

[5]  Xin Huang,et al.  S2Net: A Security Framework for Software Defined Intelligent Building Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Joel J. P. C. Rodrigues,et al.  On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[8]  Zheng Yan,et al.  Software Defined Intelligent Building , 2015, Int. J. Inf. Secur. Priv..

[9]  Vijay Vaidehi,et al.  Agent Based Health Monitoring of Elderly People in Indoor Environments Using Wireless Sensor Networks , 2013, ANT/SEIT.

[10]  Yao Liang,et al.  Towards Long-Term Multi-Hop WSN Deployments for Environmental Monitoring: An Experimental Network Evaluation , 2014, J. Sens. Actuator Networks.

[11]  Juned Ahmed Ansari Web Penetration Testing with Kali Linux , 2015 .

[12]  Xiaojiang Chen,et al.  Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags , 2016, MobiSys '16 Companion.

[13]  Xin Huang,et al.  Usable Security Mechanisms in Smart Building , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[14]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[15]  Xin Huang,et al.  POSTER: A Framework for IoT Reprogramming , 2016, SecureComm.

[16]  Xin Huang,et al.  An Access Control System for Intelligent Buildings , 2016, MobiMedia.

[17]  Zheng Yan,et al.  SecIoT: a security framework for the Internet of Things , 2016, Secur. Commun. Networks.