The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
… serious consequences are caused by these threats. We also provide diagrams and attack
… to detect their devices have been compromised until the attack causes obvious and serious …

[PDF][PDF] Security analysis threats attacks mitigations and its impact on the internet of things (IoT)

ANA Koupaei, AN Nazarov - Synchroinfo Journal, 2020 - researchgate.net
attack the Internet of things devices has more than doubled. In addition, companies using the
Internet of Things … affect organizations of any size indiscriminately, the consequences can …

[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions

MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
… of users and compromise other connected devices by exploiting IoT devices. IoT hacks can
include the hacking of medical devices that can result in fatal consequences on the patient’s …

Securing the Internet of Things: Challenges, threats and solutions

PIR Grammatikis, PG Sarigiannidis, ID Moscholios - Internet of Things, 2019 - Elsevier
… to physical attacks and natural disasters: The IoT devices are … a sensor device could be
stolen, and the fixed devices could be … can prevent the consequences of such kind of attacks. …

[PDF][PDF] Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures

M Msgna - J. Surv. Secur. Saf, 2022 - f.oaes.cc
… The aim of this paper is to provide a concise review of attacks on an Internet-of-Things
devices and greatly retard development, making the consequences of social engineering attacks

Side-channel attacks in the internet of things: threats and challenges

A Zankl, H Seuschek, G Irazoqui… - Research anthology on …, 2021 - igi-global.com
… to illustrate that physical access to devices not only enables dangerous attacks by itself, but
also … The consequence of the successful attacks on instruction set extensions and hardware …

Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
… -of-the-art medical devices by studying security tests and the attacks demonstrated by the
researchers on more than a hundred devices. Finally, … and their consequences. The wearable …

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - Journal of Hardware and …, 2018 - Springer
… Furthermore, the attacker can directly access the related attributes of the device through
physical attacks, and then start further attack, such as tag cloning and spoofing …

[HTML][HTML] Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids

P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi… - Energies, 2020 - mdpi.com
… of these nascent attacks and threats, namely the vulnerabilities in IoT devices taken care of
… Some of the significant consequences of these attacks on power grids could lead to demand…

Security and attack vector analysis of IoT devices

M Capellupo, J Liranzo, MZA Bhuiyan… - Security, Privacy, and …, 2017 - Springer
… In the 2008, there were more Internet of Things devices connected to the internet than people…
They also help distinguish how critical a device is by analyzing the potential consequences