A Novel Approach Detection for False Data Injection, and Man in the Middle Attacks in IoT and IIoT

dc.authorscopusid57201743399
dc.authorscopusid57447588400
dc.authorscopusid57223927687
dc.authorscopusid56469924100
dc.authorscopusid14047836100
dc.contributor.authorGonen, Serkan
dc.contributor.authorBariskan, Mehmet Ali
dc.contributor.authorKaplan, Derya Yiltas
dc.contributor.authorYilmaz, Ercan Nurcan
dc.contributor.authorCetin, Aydin
dc.date.accessioned2024-09-11T19:58:59Z
dc.date.available2024-09-11T19:58:59Z
dc.date.issued2023
dc.departmentİstanbul Gelişim Üniversitesien_US
dc.descriptionEnerjiSA; IEEE PES; Omicron Bahrain; SELen_US
dc.description2023 IEEE PES Generation, Transmission and Distribution International Conference and Exposition, GTD 2023 -- 22 May 2023 through 25 May 2023 -- Istanbul -- 193091en_US
dc.description.abstractHuman beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, and IIoTs into our lives with the industry 4.0 process. From smart homes to smart grids, we are faced with a world that is getting smarter in every aspect of our lives. In this cyber environment where our data, including our personal data, is transferred to the virtual environment, the biggest threat is the attacks that can be made on this existing environment. The biggest methods used by attackers are to exploit the vulnerabilities that the existing system brings in addition to the old vulnerabilities. With the IoT process, there have been very important developments, and all operations can be carried out remotely via mobile phone or computer, such as checking the missing needs in the refrigerator, washing, drying clothes, and even in the most advanced dimension, reducing the temperature if it is too high, or increasing it if it is low, without people coming to their homes, and with these renovations, new types of threads become part of our lives. With this study we focus on one of more dangerous part of these attacks, False Data Injection (FDI), and Men in the Middle (MitM) attacks. With this study we detected MitM, and FDI attacks with success rate of %95 percent. © 2023 IEEE.en_US
dc.identifier.doi10.1109/GTD49768.2023.00079
dc.identifier.endpage282en_US
dc.identifier.isbn978-172817025-1en_US
dc.identifier.scopus2-s2.0-85175448852en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage278en_US
dc.identifier.urihttps://doi.org/10.1109/GTD49768.2023.00079
dc.identifier.urihttps://hdl.handle.net/11363/8608
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofProceedings - 2023 IEEE PES GTD International Conference and Exposition, GTD 2023en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.snmz20240903_Gen_US
dc.subjectCyber Security; IIoT Security; IoT Securityen_US
dc.titleA Novel Approach Detection for False Data Injection, and Man in the Middle Attacks in IoT and IIoTen_US
dc.typeConference Objecten_US

Dosyalar