Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Cyber security threats to IoT applications and service domains
S Tweneboah-Koduah, KE Skouby… - Wireless Personal …, 2017 - Springer
We are currently living in the post-PC era where smartphones and other wireless handheld
devices are changing our environment, making it more interactive, adaptive and informative …
devices are changing our environment, making it more interactive, adaptive and informative …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT‐based security attacks. It is designed for software …
preventing various types of IoT‐based security attacks. It is designed for software …
[HTML][HTML] State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …
that are embedded with sensors, software, and other technologies intending to connect and …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …
provide advanced intelligent services and has greatly impacted our lives over time, it has a …
A review of security in internet of things
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …
made revolutionary changes in human life. The IoT enables the exchange of information in a …