Performing Real-Time Network Attacks on Smart Weather Monitoring Device Using Kali Linux

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The advancement of applications in Internet-of-Things (IoT) has taken its share in smart farming and smart agriculture. The devices used in IoT can sense, process and communicate the data across the Internet to the user. These devices are easily accessible by unauthenticated users. To secure the data collected by the smart device, it is essential to have security features imbibed. Traditionally, the security scheme developed by various researchers have been evaluated for different attacks using simulation tools like AVISPA, ProVerif. But, it is essential to check the device security by performing a real-time attack. In this research, real-Time attack strategies are shown for an IoT based weather monitoring application that are essential for smart agricultural production. Attacks such as man-in-The-middle (MITM) attack, replay attack and denial of service(DoS) attacks are performed on the weather monitoring setup. By running Elliptic Curve Cryptography (ECC) based security schemes on the devices, the attacks are performed to analyze the system response towards the real-Time attacks for various ECC based solutions.

Original languageEnglish
Title of host publicationProceedings of B-HTC 2020 - 1st IEEE Bangalore Humanitarian Technology Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728187945
DOIs
Publication statusPublished - 08-10-2020
Event1st IEEE Bangalore Humanitarian Technology Conference, B-HTC 2020 - Vijiyapur, India
Duration: 08-10-202010-10-2020

Publication series

NameProceedings of B-HTC 2020 - 1st IEEE Bangalore Humanitarian Technology Conference

Conference

Conference1st IEEE Bangalore Humanitarian Technology Conference, B-HTC 2020
Country/TerritoryIndia
CityVijiyapur
Period08-10-2010-10-20

All Science Journal Classification (ASJC) codes

  • Radiology Nuclear Medicine and imaging
  • Computer Science Applications
  • Energy Engineering and Power Technology
  • Biomedical Engineering
  • Civil and Structural Engineering
  • Safety, Risk, Reliability and Quality
  • Medicine (miscellaneous)
  • Health Informatics

Fingerprint

Dive into the research topics of 'Performing Real-Time Network Attacks on Smart Weather Monitoring Device Using Kali Linux'. Together they form a unique fingerprint.

Cite this