Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires
new types of architectures and protocols compared to traditional networks. Security is an …
new types of architectures and protocols compared to traditional networks. Security is an …
A survey on internet-of-things security: threats and emerging countermeasures
Internet of things (IoT) is a world wide network and set of paradigms that are intended to
allow communications between anything, anytime and anywhere. However, connected …
allow communications between anything, anytime and anywhere. However, connected …
Internet of things: A survey of technologies and security risks in smart home and city environments
D Bastos, M Shackleton, F El-Moussa - 2018 - IET
With the introduction of the Amazon Echo family and Google devices like Chromecast and
Home the adoption of IoT devices in the household is bound to increase exponentially this …
Home the adoption of IoT devices in the household is bound to increase exponentially this …
A review of security in internet of things
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …
made revolutionary changes in human life. The IoT enables the exchange of information in a …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
Security aspects in IoT based cloud computing
Cloud computing offers a flexible framework in which data and resources are spread across
different locations and can be accessed from various industrial environments. This …
different locations and can be accessed from various industrial environments. This …
Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
Cybersecurity threats in the age of IoT: A review of protective measures
The Internet of Things (IoT) heralds a new era of connectivity, transforming the way devices
interact and share information. With this transformative potential comes a concomitant rise in …
interact and share information. With this transformative potential comes a concomitant rise in …
Identifying the attack surface for IoT network
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …