Internet of things security analysis

G Gan, Z Lu, J Jiang - 2011 international conference on internet …, 2011 - ieeexplore.ieee.org
… The paper focuses on the application of Internet of Things in the nation and even in the global
in the future, analysing the existed security risks of the Internet of Things 's network points, …

A framework for automating security analysis of the internet of things

M Ge, JB Hong, W Guttmann, DS Kim - Journal of Network and Computer …, 2017 - Elsevier
Security models for non-IoT networks Graphical security models have been widely used for
security analysis in various types of non-IoT networks. We discuss tree-based models, graph-…

IoTSAT: A formal framework for security analysis of the internet of things (IoT)

M Mohsin, Z Anwar, G Husari… - … and network security …, 2016 - ieeexplore.ieee.org
… In this paper, we present a security analysis framework to address this challenge with the
help of a formal modeling and verification approach. This framework, named as IoTSAT, is …

A security analysis method for industrial Internet of Things

H Mouratidis, V Diamantopoulou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… We propose a novel security method for security modeling and analysis of such … As the
future work, we plan to examine the applicability of our proposed security analysis method to …

[HTML][HTML] Security analysis and improvements of authentication and access control in the internet of things

B Ndibanje, HJ Lee, SG Lee - Sensors, 2014 - mdpi.com
Security Analysis In this section, we present our proposed protocol evaluation in terms of
security analysis, in [49–52] it was shown that the security … network security, so in this analysis

Threat-based security analysis for the internet of things

AW Atamli, A Martin - … workshop on secure internet of things, 2014 - ieeexplore.ieee.org
… In our future work we aim to build on the security analysis we have performed here and on
the features of the different devices in an IoT system in order to develop a security package …

Security analysis of the Internet of Things: A systematic literature review

J Martínez, J Mejía, M Muñoz - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Nowadays people are increasingly dependent on the Internet to conduct their daily activities.
As a result of this has emerged the Internet of Things (IoT). Therefore, it has significantly …

Security analysis of the constrained application protocol in the Internet of Things

TA Alghamdi, A Lasebae… - … international conference on …, 2013 - ieeexplore.ieee.org
… In this report, we analyse security aspects of DTLS and IPSec. Our analysis will be based on
the X.… In the following section, a security analysis for DTLS and IPSec will be carried out by …

Apparatus: A framework for security analysis in internet of things systems

O Mavropoulos, H Mouratidis, A Fish, E Panaousis - Ad Hoc Networks, 2019 - Elsevier
… This paper aims to address is how to perform a security analysis in a smart city public transport
application using the Apparatus Framework. Specifically, we extend our previous work [4]…

Security analysis of a proposed internet of things middleware

HGC Ferreira, RT de Sousa Junior - Cluster Computing, 2017 - Springer
… This paper proposes security measures for a defined uniform and transparent internet of
things … technologies for internet security, as well as support for peculiar security needs of the …