IoT Hacking Attacks and Countermeasure
Sunghyuck Hong1, Jungsoo Han2, Guijung Kim3

1Sunghyuck Hong, Baekseok University, Div. of ICT, Republic of Korea.
2Jungsoo Han, Baekseok University, Div. of ICT, Republic of Korea.
3Guijung Kim, Baekseok University, Div. of ICT, Republic of Korea.
Manuscript received on 19 September 2019 | Revised Manuscript received on 06 October 2019 | Manuscript Published on 11 October 2019 | PP: 516-520 | Volume-8 Issue-2S10 September 2019 | Retrieval Number: B10900982S1019/2019©BEIESP | DOI: 10.35940/ijrte.B1090.0982S1019
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: IoT (Internet of Things) means the technology of connecting to the Internet by adding communication functions to all objects. IoT is physical constraints and limited resources which means are a vulnerability for hacking attacks. Therefore, IoT needs countermeasures of the hacking attack. These IoT devices are becoming a target of hacking. Hacking attacks on IoT devices are causing privacy and personal information leakage, and hacked devices are also used for DDoS(Distributed DoS) attacks. To overcome IoT physical constraints, various methods on each sensor in a wireless sensor networks are proposed. We analyzed various characteristics of sensor nodes and listed pros & cons. In addition, countermeasures on each IoT attacks were suggested. By analyzing such cases of hacking damage, I have identified the common weaknesses of IoT devices and looked for countermeasures. Therefore, it contributes to secure communication over a wireless sensor networks.
Keywords: Internet of Things , Malware Attack , Network Security, Network Vulnerability, Hacking Attack.
Scope of the Article: IoT