Abstract
Internet of things (IoT) is one of the emerging areas which connects billions of the devices across the world through Internet. Security and privacy in such a technological era is one of the major challenges. The IoT devices are vulnerable to dangerous attacks at various layers such as application layer, network layer, and perception layer because of their simple architecture and less secure network. In this paper, we mainly focus on the network layer security of IoT. We provide a detailed taxonomy of various attack and security tools at the network layer of IoT. We also provide a comparative analysis of these tools. We hope that our work will be helpful to the researchers working in the area of IoT security to gain better understanding about various existing tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee GM, Crespi N, Choi JK, Boussard M (2013) Internet of things. In: Evolution of telecommunication services, pp 257–282
Aircrack-ng, Thomas d’Otreppe de Bouvette. http://sourceforge.net/projects/airsnort/ (2006)
AirSnort, Blake Hegerle. http://sourceforge.net/projects/airsnort/, 8/10/2001
Kismet, Kershaw M (dragorn) http://www.kismetwireless.net/download.shtml, 2019-09
Cain and Abel, Massimiliano Montoro. https://www.hackingtools.in/free-download-cain-and-abel/, 07/04/14
abatishchev, LOIC. https://sourceforge.net/projects/loic/. Last Accessed 28 Nov 2019
COTOPAXI, Botwicz J. https://www.blackhat.com/asia-19/arsenal/schedule/index.html#cotopaxi-iot-protocols-security-testing-toolkit-14325, 26-03-19
SSLyze, iSECPartners. https://tools.kali.org/information-gathering/sslyze
Hill GR, Chidgey PJ, Kaufhold, F, Lynch T, Sahlen O, Gustavsson M, Janson M, Lagerstrom B, Grasso G, Meli F (1993) A transport network layer based on optical network elements. J Lightwave Technol 11:667–679
Khattak HA, Shah MA, Khan S, Ali I, Imran M (2019) Perception layer security in Internet of Things. Future Gener Comput Syst 100:144–164
Ben-Itzhak Y (2007) Application-layer security method and system. In: Google Patents
Zhao K, Ge L (2013) A survey on the internet of things security. In: Ninth international conference on computational intelligence and security, pp 663–667
Peng S, Shen H (2012) Security technology analysis of IoT. In: Internet of Things, pp 401–408
Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications, pp 230–234
coWPAtty, Wright J. http://sourceforge.net/projects/cowpatty/, 22/03/2004
NetStumbler. http://www.stumbler.net/, 04/2004
Ferm wifi cracker. http://www.fern-pro.com/downloads.php
Commview for wifi, TamoSoft. http://www.tamos.com/products/commwifi/ (1998)
Chen Y, Trappe W, Martin RP (2007) Detecting and localizing wireless spoofing attacks. In: 4th annual IEEE communications society conference on sensor, mesh and Ad Hoc communications and networks, pp 193–202
Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting black-hole attack in mobile ad hoc networks, detecting black-hole attack in mobile ad hoc networks
Douceur JR (2002) The Sybil attack. In: International workshop on peer-to-peer systems, pp 251–260
Choi S, Kim D, Lee D, Jung J (2008) WAP: Wormhole attack prevention algorithm in mobile ad hoc networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, pp 343–348
Kumar S (2007) Smurf-based distributed denial of service (DDoS) attack amplification in internet. In: Second international conference on internet monitoring and protection, p 25
Gill RS, Smith J, Looi MH, Clark AJ (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. University of Queensland
Tls-prober. https://en.kali.tools/all/?tool=1433, 11-02-17
Acunetix. https://www.acunetix.com/penetration-testing/?utm_source=softwaretestinghelp&utm_medium=listing&utm_campaign=pentest (2005)
Snort, Roesch M. https://www.snort.org/, 06-01-20
Nessus, Tenable, Inc. https://www.tenable.com/products/nessus/nessus-professional, 29-02-19
Retina, eEye. https://www.hackingarticles.in/retina-a-network-scanning-tool/ (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, V., Mishra, P., Kumar, S., Pilli, E.S. (2022). A Review on Attack and Security Tools at Network Layer of IoT. In: Tiwari, M., Maddila, R.K., Garg, A.K., Kumar, A., Yupapin, P. (eds) Optical and Wireless Technologies. Lecture Notes in Electrical Engineering, vol 771. Springer, Singapore. https://doi.org/10.1007/978-981-16-2818-4_54
Download citation
DOI: https://doi.org/10.1007/978-981-16-2818-4_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2817-7
Online ISBN: 978-981-16-2818-4
eBook Packages: EngineeringEngineering (R0)