{"id":"https://openalex.org/W3116720533","doi":"https://doi.org/10.1109/uemcon51285.2020.9298138","title":"A survey on Classification of Cyber-attacks on IoT and IIoT devices","display_name":"A survey on Classification of Cyber-attacks on IoT and IIoT devices","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3116720533","doi":"https://doi.org/10.1109/uemcon51285.2020.9298138","mag":"3116720533"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon51285.2020.9298138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon51285.2020.9298138","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103052785","display_name":"Yash Shah","orcid":"https://orcid.org/0000-0002-6644-0207"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yash Shah","raw_affiliation_strings":["University of Nevada, Reno, Reno, Nevada"],"affiliations":[{"raw_affiliation_string":"University of Nevada, Reno, Reno, Nevada","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100748436","display_name":"Shamik Sengupta","orcid":"https://orcid.org/0000-0002-2019-8056"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shamik Sengupta","raw_affiliation_strings":["University of Nevada, Reno, Reno, Nevada"],"affiliations":[{"raw_affiliation_string":"University of Nevada, Reno, Reno, Nevada","institution_ids":["https://openalex.org/I134113660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103052785"],"corresponding_institution_ids":["https://openalex.org/I134113660"],"apc_list":null,"apc_paid":null,"fwci":12.9614,"has_fulltext":false,"cited_by_count":128,"citation_normalized_percentile":{"value":0.99407366,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"0406","last_page":"0413"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7296304106712341},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.696286141872406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.670942485332489},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6096408367156982},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5451544523239136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5049634575843811},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.477328360080719},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4522644877433777},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.45032304525375366},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44261038303375244},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.2440565526485443},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2248249053955078}],"concepts":[{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7296304106712341},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.696286141872406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.670942485332489},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6096408367156982},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5451544523239136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5049634575843811},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.477328360080719},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4522644877433777},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.45032304525375366},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44261038303375244},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2440565526485443},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2248249053955078},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon51285.2020.9298138","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon51285.2020.9298138","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1524833151","https://openalex.org/W2201006485","https://openalex.org/W2244219004","https://openalex.org/W2567213699","https://openalex.org/W2622206102","https://openalex.org/W2891512841","https://openalex.org/W2901271685","https://openalex.org/W2901691380","https://openalex.org/W2904573081","https://openalex.org/W2907194476","https://openalex.org/W2921627745","https://openalex.org/W2921920205","https://openalex.org/W2958348420","https://openalex.org/W2969946785","https://openalex.org/W2993128749","https://openalex.org/W3010694359","https://openalex.org/W4300972769","https://openalex.org/W6631338149","https://openalex.org/W6756832365"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W2803684864","https://openalex.org/W3110253113","https://openalex.org/W2898614832"],"abstract_inverted_index":{"Internet":[0,72,121],"of":[1,15,73,81,140,145,178,191],"Things":[2,74],"(IoT)":[3],"devices":[4,28,59,83,187],"have":[5,19,105],"gained":[6],"popularity":[7,80],"in":[8],"recent":[9],"years.":[10],"With":[11],"the":[12,58,62,65,69,79,120,138,169,175],"increased":[13],"usage":[14],"IoT":[16,27,82],"devices,":[17],"users":[18],"become":[20,64],"more":[21],"prone":[22],"to":[23,33,47,61,78,88,122,127,167],"Cyber-attacks.":[24],"Threats":[25],"against":[26,37,185],"must":[29],"be":[30],"analyzed":[31],"thoroughly":[32],"develop":[34],"protection":[35],"mechanisms":[36],"them.":[38],"An":[39],"attacker's":[40],"purpose":[41],"behind":[42],"launching":[43],"an":[44,181],"attack":[45],"is":[46,125,131],"find":[48],"a":[49,53,142],"weak":[50],"link":[51],"within":[52],"network":[54,63],"and":[55,84,92,111,158,164,188],"once":[56],"discovered,":[57],"connected":[60],"primary":[66],"target":[67],"for":[68],"attackers.":[70],"Industrial":[71],"(IIoT)":[75],"emerged":[76],"due":[77],"they":[85],"are":[86],"used":[87],"interconnect":[89],"machines,":[90],"sensors,":[91],"actuators":[93],"at":[94,101],"large":[95],"manufacturing":[96,170],"plants.":[97],"By":[98],"incorporating":[99],"IIoT":[100,116],"their":[102],"facilities":[103],"companies":[104],"benefited":[106],"by":[107],"reducing":[108],"operational":[109],"costs":[110],"increasing":[112],"productivity.":[113],"However,":[114],"as":[115],"relies":[117],"on":[118],"utilizing":[119],"operate":[123],"it":[124],"vulnerable":[126],"Cyber-attacks":[128],"if":[129],"security":[130],"not":[132],"taken":[133],"into":[134],"consideration.":[135],"After":[136],"seeing":[137],"advantages":[139],"IIoT,":[141],"new":[143],"version":[144],"smart":[146],"industries":[147],"has":[148],"been":[149],"introduced":[150],"called":[151],"Industry":[152,154],"4.0.":[153],"4.0":[155],"combines":[156],"cloud":[157],"fog":[159],"computing,":[160],"cyber-physical":[161],"systems":[162],"(CPS),":[163],"data":[165],"analytics":[166],"automate":[168],"process.":[171],"This":[172],"paper":[173],"surveys":[174],"different":[176],"classifications":[177],"attacks":[179,194],"that":[180],"attacker":[182],"can":[183],"launch":[184],"these":[186],"mentions":[189],"methods":[190],"mitigating":[192],"such":[193],"<sup":[195],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[196],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[197],".":[198]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":36},{"year":2024,"cited_by_count":32},{"year":2023,"cited_by_count":35},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
