A survey on sensor-based threats and attacks to smart devices and applications
… With the tremendous growth of Internet of Things (IoT), smart devices now have advanced
… , all of the threats (7 reported threats and attacks) are active which limits the consequences (…
… , all of the threats (7 reported threats and attacks) are active which limits the consequences (…
Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
G Rajendran, RSR Nivash, PP Parthy… - 2019 International …, 2019 - ieeexplore.ieee.org
… of attack and its consequences. … attacks on the IoT infrastructure are categorized and
enumerated accordingly. Making a secure smart device while taking the constraints of the device …
enumerated accordingly. Making a secure smart device while taking the constraints of the device …
Extended functionality attacks on IoT devices: The case of smart lights
E Ronen, A Shamir - 2016 IEEE European Symposium on …, 2016 - ieeexplore.ieee.org
… Things (IoT) devices, which bridge the physical and virtual worlds. We propose a new taxonomy
of attacks… In some cases the consequences of lost functionality can be more serious: For …
of attacks… In some cases the consequences of lost functionality can be more serious: For …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
… powered devices, the denial of sleep attack will result in energy depletion [68]. This … It
might however have serious consequences when combined with other attacks. Sybil Attack: A …
might however have serious consequences when combined with other attacks. Sybil Attack: A …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… As a consequence, more and more IoT devices are being deployed in a variety of public …
Then, we report and analyze some of the attacks against real IoT devices reported in the …
Then, we report and analyze some of the attacks against real IoT devices reported in the …
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
… Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry.
To reduce costs related to the time required to develop these devices, … consequences of …
To reduce costs related to the time required to develop these devices, … consequences of …
Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats.
B Smail, DT Sanchez, LB Peconcillo Jr… - … Journal of Next …, 2022 - search.ebscohost.com
… of memory, the majority of Internet of Things devices have few security choices available. This
… As a consequence of the Internet of Things, the inefficiencies that are caused by individual …
… As a consequence of the Internet of Things, the inefficiencies that are caused by individual …
Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks
M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
… and attacks against IoT devices and services are on the increase as well. Cyber-attacks are
… To reduce both potential threats and their consequences, more research is needed to fill the …
… To reduce both potential threats and their consequences, more research is needed to fill the …
Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
… , and devastating cyberattacks that may have serious consequences. The security of IoT …
devices (Things), cybercriminals can build large botnets and exploit them to generate attacks …
devices (Things), cybercriminals can build large botnets and exploit them to generate attacks …
Stealing, spying, and abusing: Consequences of attacks on internet of things devices
… by these devices. We believe that by understanding the potential real-world consequences
of attacks on IoT devices, we can better articulate what is at stake when these devices are …
of attacks on IoT devices, we can better articulate what is at stake when these devices are …