Categorisation of security threats for smart home appliances
A Gai, S Azam, B Shanmugam… - 2018 International …, 2018 - ieeexplore.ieee.org
… devices getting connected and having such vulnerabilities and exploits may result in severe
consequences … shown that how these devices are vulnerable to attacks such as Heartbleed, …
consequences … shown that how these devices are vulnerable to attacks such as Heartbleed, …
A survey on security and privacy issues in Internet-of-Things
Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
… attack (DDoS) attack using a network of consumer devices from the IoT. Security and privacy
remain huge issues for IoT devices, … The paper focused on the consequence of the door’s …
remain huge issues for IoT devices, … The paper focused on the consequence of the door’s …
Quantitative analysis of DoS attacks and client puzzles in IoT systems
L Arnaboldi, C Morisset - … : 13th International Workshop, STM 2017, Oslo …, 2017 - Springer
… Things (IoT) as devices have less computing power, memory and security mechanisms to
mitigate DoS attacks… of snowball effect, and as a consequence the manner in which we …
mitigate DoS attacks… of snowball effect, and as a consequence the manner in which we …
Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors
… of the attack, it can cause severe consequences if the state … attack method that can be launched
using an ordinary device. … Durumeric, “All things considered: an analysis of iot devices on …
using an ordinary device. … Durumeric, “All things considered: an analysis of iot devices on …
Identifying the attack surface for IoT network
… IoT device can be exploited to successfully launch an attack. … at device level is presented in
Table 2 where different attacks … as attack locations (eg, server level attack versus host/device-…
Table 2 where different attacks … as attack locations (eg, server level attack versus host/device-…
Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy
S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
… attack effect dimension ranges from consequences on system level, such as Denial-of-Service,
to general effects, such as financial loss. Taking a more technical perspective, Pan et al. (…
to general effects, such as financial loss. Taking a more technical perspective, Pan et al. (…
Security attacks against the availability of LTE mobility networks: Overview and research directions
RP Jover - 2013 16th international symposium on wireless …, 2013 - ieeexplore.ieee.org
… Therefore, the consequences of a Denial of Service (low … [6], giving shape to the Internet of
Things (loT) [7]. At the same … DDoS attacks launched by a botnet of mobile devices or a high …
Things (loT) [7]. At the same … DDoS attacks launched by a botnet of mobile devices or a high …
Is your kettle smarter than a hacker? a scalable tool for assessing replay attack vulnerabilities on consumer iot devices
… Abstract—Consumer Internet of Things (IoT) devices often leverage the local network to
communicate with the … As a consequence, when our tool fails to perform a replay attack on the …
communicate with the … As a consequence, when our tool fails to perform a replay attack on the …
The Internet of Things: a security point of view
… consequence, new security design for IoT shall pay attention to these new standards. Security
at both the physical devices … cyber attacks, wireless sensor networks, the Internet of Things …
at both the physical devices … cyber attacks, wireless sensor networks, the Internet of Things …