{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:07:13Z","timestamp":1753880833951,"version":"3.41.2"},"reference-count":48,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2022,1,30]]},"abstract":"<jats:p> In the early 2000s, the Internet meant being able to connect different communication devices, whereas the focus in the last few years is on connecting \u201cthings\u201d to the Internet. Although there is no distinct classification for these devices and things on the Internet, the Internet of Things (IoT) ecosystem primarily consists of a complex network of devices, sensors, and things. These \u201cthings\u201d are controlled by humans and utilize the existing cloud infrastructure. These devices provide facilities and benefits to make our lives comfortable. IoT domains include smart homes, healthcare, manufacturing, smart wearables, smart cities, smart grids, industrial IoT, connected vehicles, and smart retail. Different IoT models involve human-to-IoT, IoT-to-IoT, IoT-to-traditional systems architectures. In most scenarios, the architecture ends up connecting to the unsecured Internet. This has thrown open several critical issues leading to cybersecurity attacks on IoT devices. IoT communications, protocols or the architecture were never been conceptualized to handle the new age cybersecurity attacks. IoT devices have limited compute, storage, network, or memory. In this research, the authors present a unique IoT attack framework named IAF focusing on the impact of IoT attacks on IoT applications and service levels. The authors also proposed an all-inclusive attack taxonomy classifying various attacks on IoT ecosystems. <\/jats:p>","DOI":"10.1142\/s0218126622500293","type":"journal-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T03:13:01Z","timestamp":1633576381000},"source":"Crossref","is-referenced-by-count":5,"title":["IAF: IoT Attack Framework and Unique Taxonomy"],"prefix":"10.1142","volume":"31","author":[{"given":"Akashdeep","family":"Bhardwaj","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Petroleum & Energy Studies (UPES), Bidoli, Dehradun, India"}]},{"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Petroleum & Energy Studies (UPES), Bidoli, Dehradun, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6578-6919","authenticated-orcid":false,"given":"Thompson","family":"Stephan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Faculty of Engineering and Technology, M. S. Ramaiah University of Applied Sciences, Bangalore, Karnataka, India"}]},{"given":"Achyut","family":"Shankar","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, India"}]},{"given":"Muhammad Rukunuddin","family":"Ghalib","sequence":"additional","affiliation":[{"name":"School of Computer Science & Engineering, Vellore Institute of Technology (VIT), Vellore, India"}]},{"given":"Sheikh","family":"Abujar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"}]}],"member":"219","published-online":{"date-parts":[[2021,10,6]]},"reference":[{"key":"S0218126622500293BIB009","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/WF-IoT.2019.8767170","volume-title":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT)","author":"Reddy V. B.","year":"2019"},{"key":"S0218126622500293BIB010","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1109\/ICOEI.2019.8862720","volume-title":"2019 3rd Int. Conf. Trends in Electronics and Informatics (ICOEI)","author":"Vishwakarma R.","year":"2019"},{"key":"S0218126622500293BIB011","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/ComComAp46287.2019.9018775","volume-title":"2019 Computing, Communications and IoT Applications (ComComAp)","author":"Luo X.","year":"2019"},{"key":"S0218126622500293BIB012","first-page":"819","volume-title":"2018 17th IEEE Int. Conf. Trust, Security and Privacy in Computing and Communications\/12th IEEE Int. Conf. Big Data Science And Engineering TrustCom\/BigDataSE)","author":"Shah T.","year":"2018"},{"key":"S0218126622500293BIB013","first-page":"1","volume-title":"2019 27th Telecommunications Forum (TELFOR)","author":"Kep\u00e7eo\u011flu B.","year":"2019"},{"key":"S0218126622500293BIB015","first-page":"1","volume-title":"2019 Fourth Int. Conf. Informatics and Computing (ICIC)","author":"Soe Y. N.","year":"2019"},{"key":"S0218126622500293BIB016","doi-asserted-by":"crossref","first-page":"8183","DOI":"10.1109\/ACCESS.2017.2680463","volume":"5","author":"Xie S.","year":"2017","journal-title":"IEEE Access"},{"key":"S0218126622500293BIB017","first-page":"32","volume-title":"2017 Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)","author":"Deogirikar J.","year":"2017"},{"key":"S0218126622500293BIB018","first-page":"1","volume-title":"IEEE International Conference on Computer Science and Engineering (UBMK)","author":"Okul A.","year":"2017"},{"key":"S0218126622500293BIB019","first-page":"1","volume-title":"2019 16th Annual IEEE Int. Conf. Sensing, Communication, and Networking (SECON)","author":"Sagduyu Y. E.","year":"2019"},{"key":"S0218126622500293BIB020","first-page":"1","volume-title":"2019 Global IoT Summit (GIoTS)","author":"Tzagkarakis C.","year":"2019"},{"key":"S0218126622500293BIB021","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/WF-IoT.2018.8355182","volume-title":"2018 IEEE 4th World Forum on Internet of Things (WF-IoT)","author":"Singh M.","year":"2018"},{"key":"S0218126622500293BIB022","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"Meneghello F.","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"S0218126622500293BIB023","first-page":"000209","volume-title":"2018 IEEE 16th Int. Symp. Intelligent Systems and Informatics (SISY)","author":"Huraj L.","year":"2018"},{"key":"S0218126622500293BIB024","first-page":"794","volume-title":"2018 9th Int. Conf. Information Technology in Medicine and Education (ITME)","author":"Cui Y.","year":"2018"},{"key":"S0218126622500293BIB025","doi-asserted-by":"crossref","first-page":"36847","DOI":"10.1109\/ACCESS.2020.2975016","volume":"8","author":"Mohammed H.","year":"2020","journal-title":"IEEE Access"},{"key":"S0218126622500293BIB026","first-page":"1","volume-title":"2018 3rd Int. Conf. Emerging Trends in Engineering, Sciences and Technology (ICEEST)","author":"Haider W.","year":"2018"},{"key":"S0218126622500293BIB027","doi-asserted-by":"crossref","first-page":"10934","DOI":"10.1109\/JIOT.2019.2932980","volume":"6","author":"Rana M. M.","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"S0218126622500293BIB028","doi-asserted-by":"crossref","first-page":"116390","DOI":"10.1109\/ACCESS.2019.2934122","volume":"7","author":"Liao R.-F.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218126622500293BIB029","doi-asserted-by":"crossref","first-page":"74089","DOI":"10.1109\/ACCESS.2019.2920488","volume":"7","author":"Chen S.","year":"2019","journal-title":"IEEE Access"},{"key":"S0218126622500293BIB030","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TII.2017.2769106","volume":"14","author":"Hamedani K.","year":"2017","journal-title":"IEEE Trans. Indus. Inform."},{"key":"S0218126622500293BIB031","doi-asserted-by":"crossref","first-page":"2389","DOI":"10.1109\/COMST.2018.2812301","volume":"20","author":"Wu J.","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"S0218126622500293BIB032","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/JSYST.2016.2550530","volume":"10","author":"Wu J.","year":"2016","journal-title":"IEEE Syst. J."},{"key":"S0218126622500293BIB033","doi-asserted-by":"crossref","first-page":"73603","DOI":"10.1109\/ACCESS.2018.2878681","volume":"6","author":"Atat R.","year":"2018","journal-title":"IEEE Access"},{"key":"S0218126622500293BIB034","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"Wang D.","year":"2018","journal-title":"IEEE Trans. Indus. Inform."},{"journal-title":"IEEE Trans. Depend. Secure Comput.","year":"2020","author":"Wang C.","key":"S0218126622500293BIB035"},{"key":"S0218126622500293BIB036","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.003","volume":"87","author":"Masdari M.","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"S0218126622500293BIB037","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"Wang D.","year":"2014","journal-title":"Comput. Netw."},{"issue":"3","key":"S0218126622500293BIB038","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3325130","volume":"4","author":"Wang D.","year":"2020","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"S0218126622500293BIB039","first-page":"708","volume":"15","author":"Wang D.","year":"2016","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"S0218126622500293BIB040","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232277"},{"key":"S0218126622500293BIB041","first-page":"1","volume-title":"2018 IEEE Int. Conf. Communications (ICC)","author":"Zhou B.","year":"2018"},{"key":"S0218126622500293BIB042","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2902845"},{"key":"S0218126622500293BIB043","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/JSYST.2016.2550530","volume":"10","author":"Wu J.","year":"2016","journal-title":"IEEE Syst. J."},{"key":"S0218126622500293BIB044","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.014220"},{"key":"S0218126622500293BIB045","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000374"},{"journal-title":"IEEE Internet Things J.","year":"2021","author":"Yu K.","key":"S0218126622500293BIB046"},{"issue":"11","key":"S0218126622500293BIB047","doi-asserted-by":"crossref","first-page":"7669","DOI":"10.1109\/TII.2021.3049141","volume":"17","author":"Yu K.-P.","year":"2021","journal-title":"IEEE Trans. Indus. Inform."},{"key":"S0218126622500293BIB048","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103517"},{"key":"S0218126622500293BIB049","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000223"},{"journal-title":"IEEE J. Biomed. Health Inform.","year":"2021","author":"Li H.","key":"S0218126622500293BIB050"},{"key":"S0218126622500293BIB051","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030856"},{"issue":"5","key":"S0218126622500293BIB052","doi-asserted-by":"crossref","first-page":"5184","DOI":"10.1109\/TVT.2021.3076015","volume":"70","author":"Zhen L.","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"S0218126622500293BIB053","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TMM.2018.2882744","volume":"21","author":"Zhang Y.","year":"2018","journal-title":"IEEE Trans. Multimed."},{"key":"S0218126622500293BIB054","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2936792"},{"journal-title":"IEEE Internet Things J.","year":"2021","author":"Zhang Y.","key":"S0218126622500293BIB055"},{"journal-title":"IEEE Trans. Fuzzy Syst.","year":"2021","author":"Guo Z.","key":"S0218126622500293BIB056"},{"journal-title":"IEEE Trans. Netw. Sci. Eng.","year":"2021","author":"Guo Z.","key":"S0218126622500293BIB057"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126622500293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T09:36:32Z","timestamp":1645781792000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126622500293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":48,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2022,1,30]]}},"alternative-id":["10.1142\/S0218126622500293"],"URL":"https:\/\/doi.org\/10.1142\/s0218126622500293","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2021,10,6]]},"article-number":"2250029"}}