MAN-IN-THE-MIDDLE ATTACKS AND INTERNET OF THINGS

Journal Title: FBIM Transactions - Year 2017, Vol 0, Issue 2

Abstract

A rapid development of computers and computer software are some of the causes of the security vulnerabilities that allow attackers to successfully carry out attacks on information systems of their users. The massive spread of the Internet of Things will make a greater difference between the current understanding of the Internet, which is reflected in the "dot-com", "social networks" and web of "experience", and the new Internet that will enable new and revolutionary applications with the potential to significantly improve the quality of life. Given that different devices have come with embedded computer components and connectivity to the Internet, and the possibilities of mutual communication, it is real they will be exposed to some variants of attacks that have been seen in practice so far. This paper analyzes some aspects of the "man in the middle" attacks related to the Internet of things. After a short introductory presentation on the Internet of things and "man-in-the-middle" attack, the paper presents the technology of this attack, as well as the benefits that an attacker could have from a successful attack. Also, here are shown some known examples of successful attacks, the economic consequences of such attacks, as well as some of the ways of protection against these and similar attacks. The conclusion shows the summary of the whole analysis together with the assumptions on the future development of the Internet of things and the possible attacks on the connected devices.

Authors and Affiliations

Zoran Čekerevac, Zdenek Dvorak, Lyudmila Prigoda, Petar Čekerevac

Keywords

Related Articles

THE RADICALIZATION OF HIGH-TECH TERRORISM

High-tech terrorism has been a risk since the advent of the Internet. Technology has evolved at a rapid pace, thus the risk and impact of high-tech terrorism. Importantly, there are secure and up-to-date mechanisms to mi...

HACCP QUALITY MANAGEMENT AND APPLICATION OF HACCP STANDARDS IN TRADE

The term quality is more and more present as an imperative in modern business. If you want to be competitive in the market, every company needs to be focused on quality in all segments of its business, because it is cons...

MARKETING STRATEGIES IN CONDITIONS OF CRISIS

The research presented in this paper refers to the adjustment of marketing strategy and basic elements of marketing in conditions of crisis with the aim of company repositioning in order of achieving a competitive advant...

EKOLOŠKI IZAZOVI PRIVREDNOG RAZVOJA

glavnog težišta globalne ekonomije iz sektora proizvodnje u sektor finansija, kao da privredna aktivnost više nije važna. Time je formalizovana primitivna privatna sloboda da se profitira na siromaštvu u formi tajno osmi...

OSNOVNE POSTAVKE BUDŽETSKE POLITIKE NA PRIMERU EVROPSKE UNIJE I REPUBLIKE SRBIJE

Budžet Evropske unije je definisan osnivačkim ugovorima, a osnove budžetskog sistema Srbije utvrđene su Zakonom o budžetskom sistemu Srbije. Pomenutim zakonom uređuje se planiranje, priprema i donošenje budžeta Republike...

Download PDF file
  • EP ID EP331442
  • DOI 10.12709/fbim.05.05.02.03
  • Views 95
  • Downloads 0

How To Cite

Zoran Čekerevac, Zdenek Dvorak, Lyudmila Prigoda, Petar Čekerevac (2017). MAN-IN-THE-MIDDLE ATTACKS AND INTERNET OF THINGS. FBIM Transactions, 0(2), 18-28. https://www.europub.co.uk/articles/-A-331442