Internet of Things backdoors: Resource management issues, security challenges, and detection methods

S Hashemi, M Zarei - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

IoT network security: requirements, threats, and countermeasures

A Hamza, HH Gharakheili, V Sivaraman - arXiv preprint arXiv:2008.09339, 2020 - arxiv.org
IoT devices are increasingly utilized in critical infrastructure, enterprises, and households.
There are several sophisticated cyber-attacks that have been reported and many networks …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

A framework for malicious traffic detection in IoT healthcare environment

F Hussain, SG Abbas, GA Shah, IM Pires, UU Fayyaz… - Sensors, 2021 - mdpi.com
The Internet of things (IoT) has emerged as a topic of intense interest among the research
and industrial community as it has had a revolutionary impact on human life. The rapid …

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …