A survey on sensor-based threats and attacks to smart devices and applications
… With the tremendous growth of Internet of Things (IoT), smart devices now have advanced
… , all of the threats (7 reported threats and attacks) are active which limits the consequences (…
… , all of the threats (7 reported threats and attacks) are active which limits the consequences (…
Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
… , and devastating cyberattacks that may have serious consequences. The security of IoT …
devices (Things), cybercriminals can build large botnets and exploit them to generate attacks …
devices (Things), cybercriminals can build large botnets and exploit them to generate attacks …
[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions
MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
… of users and compromise other connected devices by exploiting IoT devices. IoT hacks can
include the hacking of medical devices that can result in fatal consequences on the patient’s …
include the hacking of medical devices that can result in fatal consequences on the patient’s …
[HTML][HTML] Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids
… of these nascent attacks and threats, namely the vulnerabilities in IoT devices taken care of
… Some of the significant consequences of these attacks on power grids could lead to demand…
… Some of the significant consequences of these attacks on power grids could lead to demand…
[HTML][HTML] Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications
… End nodes are typically Internet of Things devices that gather data from their physical
environment and transmit them to gateways through the LoRa physical layer. The gateways then …
environment and transmit them to gateways through the LoRa physical layer. The gateways then …
[HTML][HTML] Attack categorisation for IoT applications in critical infrastructures, a survey
… , we define the notion of the Internet-of-Things and the unique qualities of such devices. …
and control of such devices could have significant consequences on the patient’s well-being. …
and control of such devices could have significant consequences on the patient’s well-being. …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
… of implantable medical devices, body area networks, and Internet of Things technologies in
… the consequences of these threats. We present a detailed survey of different potential attacks …
… the consequences of these threats. We present a detailed survey of different potential attacks …
Security considerations for Internet of Things: A survey
… Data and identity theft is another category of attack that gives grave consequences for the …
Mitigating the risk of an intrusion attempt or attack against an IoT device is not an easy thing …
Mitigating the risk of an intrusion attempt or attack against an IoT device is not an easy thing …
[HTML][HTML] Resistance of IoT sensors against DDoS attack in smart home environment
… Internet of Things devices is not yet sufficient for the entire ecosystem of the Internet of Things.
… from the life of a smart home with unpleasant consequences. Such is, for example, the …
… from the life of a smart home with unpleasant consequences. Such is, for example, the …
The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
… attacks aimed at devices themselves, it is equally important to consider that IoT devices may
be used in attacks targeting other devices … any long-term consequences from being unable …
be used in attacks targeting other devices … any long-term consequences from being unable …