Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Denial of Service Attacks (DoS)

Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
In this type of cyber-attack, targeted victim (server, service, etc.) is overwhelmed by the fake requests (such as fabricated user queries), so that it is prevented from serving the legit requests (such as the queries resulting from real users).
Published in Chapter:
Implications of Cybersecurity Breaches in LPWANs
Åke Axeland (Chalmers University of Technology, Sweden), Henrik Hagfeldt (Chalmers University of Technology, Sweden), Magnus Carlsson (Chalmers University of Technology, Sweden), Lina Lagerquist Sergel (Chalmers University of Technology, Sweden), and Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch001
Abstract
With the contrast of limited performance and big responsibility of IoT devices, potential security breaches can have serious impacts in means of safety and privacy. Potential consequences of attacks on IoT devices could be leakage of individuals daily habits and political decisions being influenced. While the consequences might not be avoidable in their entirety, adequate knowledge is a fundamental part of realizing the importance of IoT security and during the assessment of damages following a breach. This chapter will focus on two low-powered wide area network (LPWAN) technologies, narrow-band iot (NB-IoT) and long-range wide area network (LoRaWAN). Further, three use cases will be considered—healthcare, smart cities, and industry—which all to some degree rely on IoT devices. It is shown that with enough knowledge of possible attacks and their corresponding implications, more secure IoT systems can be developed.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR