A Taxonomy of Trust Attack Mechanisms in Internet of Things Networks and Countermeasure Analysis
- Version
- Download 12
- File Size 522.49 KB
- File Count 1
- Create Date 24 November 2025
- Last Updated 24 November 2025
A Taxonomy of Trust Attack Mechanisms in Internet of Things Networks and Countermeasure Analysis
Manish Kumar Harshit Pandey Paras Yadav
CSA CSA CSA
Sharda University Sharda University Sharda University
Greater.Noida Delhi Greater.Noida
2023411548.manish@ harshitpb96@ yadav16118119@
ug.sharda.ac.in gmail.com gmail.com
Supervisor- Mr Manoj Kumar,Department of CSA,Sharda university
Abstract
The Internet of Things (IoT), growing rapidly, creates a network of connected smart devices. IoT's low computational power, energy constraints, and dynamic topology make it highly susceptible to cyber threats despite offering significant advantages in connectivity. Trust management has become an essential tool for ensuring safe communication between various types of electronic gadgets. However, relying on trust has led to the creation of a group of complex attacks that specifically aim to exploit and control trust levels. This document thoroughly examines all methods used in attacks. A classification of trust attacks divides them into two categories: direct attacks where a malicious node alters its actions independently, and indirect attacks aimed at corrupting the reputation system by providing misleading suggestions. We examine and debate current strategies for defending against cyber threats, focusing on methods such as those that are quick to use, spread across multiple locations, and rely on mathematical theories. The paper concludes by pointing out major obstacles and suggesting paths for further study to create stronger and more dependable Internet of Things systems. Internet of Things, security of IoT systems, managing trust in these systems, attacks from cyber threats, categorization for defense strategies, countermeasures against such risks.
Keywords: Internet of Things, IoT Security, Trust Management, Cyber Attacks, Trust Attacks, Taxonomy, Countermeasures.
Download