Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things

G George, SM Thampi - Pervasive and Mobile Computing, 2019 - Elsevier
Edge computing envisages a distributed decentralized processing of data through a set of
edge devices in the proximity of the data origins to improve the network latency and …

Threat model for securing internet of things (IoT) network at device-level

S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
Abstract The Internet of Things (IoT) creates a theoretical bridge between end-users and the
digital world. The IoT embodies a massive group of interconnected computing devices …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

[HTML][HTML] IoTSecSim: A framework for modelling and simulation of security in Internet of things

KO Chee, M Ge, G Bai, DD Kim - Computers & Security, 2024 - Elsevier
The proliferation of the Internet of Things (IoT) devices has provided attackers with
tremendous opportunities to launch various cyber-attacks. It has been challenging to …

IoTSAT: A formal framework for security analysis of the internet of things (IoT)

M Mohsin, Z Anwar, G Husari… - … IEEE conference on …, 2016 - ieeexplore.ieee.org
The new attack surface being crafted by the huge influx of IoT devices is both formidable and
unpredictable, as it introduces a rich set of unexplored attack techniques and unknown …

A survey of security architectures for edge computing-based IoT

E Fazeldehkordi, TM Grønli - IoT, 2022 - mdpi.com
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …

Combinatorial analysis for securing IoT-assisted industry 4.0 applications from vulnerability-based attacks

G George, SM Thampi - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
Modern Internet of Things (IoT)-assisted networks deploy many critical computing devices in
the edge of the network so as to mitigate the bottleneck of network latency and bandwidth …

A layered taxonomy of internet of things attacks

F Azzedin, I Alhejri - Proceedings of the 6th International Conference on …, 2022 - dl.acm.org
Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny
wearable devices to large industrial systems. However, ensuring the security of IoT systems …

An edge-driven security framework for intelligent internet of things

M Dai, Z Su, R Li, Y Wang, J Ni, D Fang - IEEE Network, 2020 - ieeexplore.ieee.org
The rise of the intelligent Internet of Things (IoT) promotes the development of emerging
technologies and industries with the integration of edge computing and cloud computing …

An attack tree based risk evaluation approach for the internet of things

W Asif, IG Ray, M Rajarajan - … of the 8th International Conference on the …, 2018 - dl.acm.org
Internet of Things (IoTs) are being widely used for a large number of use case scenarios,
where a wide range of devices, with different computational resources, are marshalled for …