Categorisation of security threats for smart home appliances

A Gai, S Azam, B Shanmugam… - 2018 International …, 2018 - ieeexplore.ieee.org
devices getting connected and having such vulnerabilities and exploits may result in severe
consequences … shown that how these devices are vulnerable to attacks such as Heartbleed, …

A survey on security and privacy issues in Internet-of-Things

Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
attack (DDoS) attack using a network of consumer devices from the IoT. Security and privacy
remain huge issues for IoT devices, … The paper focused on the consequence of the door’s …

Attacks?

E Conway - … , Protection, Safety, Security for the Internet of Things, 2019 - books.google.com
… a data breach or cyber attack caused by a third party’s unsecured IoT devices?” Ponemon
… Taint can have far-reaching consequences. Counterfeit Solutions —Functional integrity and …

Quantitative analysis of DoS attacks and client puzzles in IoT systems

L Arnaboldi, C Morisset - … : 13th International Workshop, STM 2017, Oslo …, 2017 - Springer
Things (IoT) as devices have less computing power, memory and security mechanisms to
mitigate DoS attacks… of snowball effect, and as a consequence the manner in which we …

Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors

C Fu, Q Zeng, H Chi, X Du… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
… of the attack, it can cause severe consequences if the state … attack method that can be launched
using an ordinary device. … Durumeric, “All things considered: an analysis of iot devices on …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
… IoT device can be exploited to successfully launch an attack. … at device level is presented in
Table 2 where different attacks … as attack locations (eg, server level attack versus host/device-…

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
attack effect dimension ranges from consequences on system level, such as Denial-of-Service,
to general effects, such as financial loss. Taking a more technical perspective, Pan et al. (…

Security attacks against the availability of LTE mobility networks: Overview and research directions

RP Jover - 2013 16th international symposium on wireless …, 2013 - ieeexplore.ieee.org
… Therefore, the consequences of a Denial of Service (low … [6], giving shape to the Internet of
Things (loT) [7]. At the same … DDoS attacks launched by a botnet of mobile devices or a high …

Is your kettle smarter than a hacker? a scalable tool for assessing replay attack vulnerabilities on consumer iot devices

S Lazzaro, V De Angelis, AM Mandalari… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
… Abstract—Consumer Internet of Things (IoT) devices often leverage the local network to
communicate with the … As a consequence, when our tool fails to perform a replay attack on the …

The Internet of Things: a security point of view

S Li, T Tryfonas, H Li - Internet Research, 2016 - emerald.com
consequence, new security design for IoT shall pay attention to these new standards. Security
at both the physical devices … cyber attacks, wireless sensor networks, the Internet of Things