Taxonomy of Security Attacks on Internet of Things
Abstract Internet of Things (IoT) are an extensive smart device networked ecosystem, which
routinely exchange log data and information over the Internet with portals and humans …
routinely exchange log data and information over the Internet with portals and humans …
Securing the Internet of Things: best practices for deploying IoT devices
BR Payne, TT Abegaz - Computer and Network Security Essentials, 2018 - Springer
Abstract The Internet of Things (IoT) has brought a wealth of new technologies both in
homes and businesses onto IP networks not natively designed to securely support such …
homes and businesses onto IP networks not natively designed to securely support such …
Internet of things: A survey of technologies and security risks in smart home and city environments
D Bastos, M Shackleton, F El-Moussa - 2018 - IET
With the introduction of the Amazon Echo family and Google devices like Chromecast and
Home the adoption of IoT devices in the household is bound to increase exponentially this …
Home the adoption of IoT devices in the household is bound to increase exponentially this …
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …
applications in a diversity of application domains. This has resulted in creation of new …
Internet of Things: Architectures, Applications, and Challenges
K Laturkar, K Laturkar - Handbook of Research on Data Science and …, 2023 - igi-global.com
With the internet of things (IoT) growing steadily, a wide range of application fields are being
offered. These include monitoring health, weather, smart homes, autonomous vehicles, and …
offered. These include monitoring health, weather, smart homes, autonomous vehicles, and …
Security considerations for Internet of Things: A survey
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
[HTML][HTML] Securing small-business and home internet of things (iot) devices
D Dodson, T Polk, M Souppaya, WC Barker, P Grayeli… - 2019 - nccoe.nist.gov
The rapid growth of IoT devices has the potential to provide many benefits. It is also a cause
for concern because IoT devices are tempting targets for attackers. State-of-the-art security …
for concern because IoT devices are tempting targets for attackers. State-of-the-art security …
Cyber-security of embedded IoTs in smart homes: challenges, requirements, countermeasures, and trends
A Aldahmani, B Ouni, T Lestable… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
Connected computers and sensors transmit data across the Internet to solve problems and
generate new services (IoT). Smart homes use IoT, for example. Smart home technology can …
generate new services (IoT). Smart homes use IoT, for example. Smart home technology can …
Case studies of selected iot deployments
S Misra, M Maheswaran, S Hashmi, S Misra… - Security Challenges and …, 2017 - Springer
This chapter presents three major IoT deployments: connected vehicles involving vehicular
ad-hoc networks or VANETs, eHealth, and the smart grid. The first two IoT deployments are …
ad-hoc networks or VANETs, eHealth, and the smart grid. The first two IoT deployments are …
IoT Security, Privacy, Challenges, and Solutions
A Garg, A Gambhir, P Goel - Trust‐Based Communication …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) refers to a large number of physical devices available
in the world that are connected to the internet to share data. Exchanging data using IoT …
in the world that are connected to the internet to share data. Exchanging data using IoT …