Ozalp, A.N.Albayrak, Z.Cakmak, M.Ozdogan, E.2024-09-292024-09-292022978-166546835-0https://doi.org/10.1109/HORA55278.2022.9800047https://hdl.handle.net/20.500.14619/94244th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, HORA 2022 -- 9 June 2022 through 11 June 2022 -- Ankara -- 180434The Internet of Things (IoT) is a network of millions of smart devices and sensors connected to a network. These devices are used in smart cities, public transportation, smart grids and power transmission lines. Considering IoT devices as a sensor that can be connected to a computer network, it has been seen that they are under many cyber threats. In this study, the concept of security in IoT devices is expressed according to layer architectures, and security requirements in IoT devices cloud layer, application layer, network layer, data layer, and physical layer are analyzed. Possible vulnerabilities and attacks against IoT devices have been examined by layers and next, IoT attacks are classified and layer-based security requirements are explained. © 2022 IEEE.eninfo:eu-repo/semantics/closedAccesscyber securitycyberattacksinternet of things networkssensorsvulnerabilityLayer-based examination of cyber-attacks in IoTConference Object10.1109/HORA55278.2022.98000472-s2.0-85133972029N/A