IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
… Moreover, we review the security vulnerabilities of these technologies, reporting different …
At DEF CON 2016, researchers presented several security vulnerabilities of a large number of …

Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications

TM Ghazal, MAM Afifi, D Kalra - Solid State …, 2020 - research.skylineuniversity.ac.ae
… to IoT threats and vulnerabilities so that the data security over … one is threat identification, and
the other one is threat mitigation… which will be used for threat mitigation. Sometimes, it is not …

Internet of Things: Security vulnerabilities and challenges

I Andrea, C Chrysostomou… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Internet is the foundation and core supporting IoT hence almost all the security threats that lie
within Internet … urgency of addressing these security threats before deployment. Although a …

Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks

M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
… In this paper, security challenges and security threats to IoT were introduced. The … threats,
attacks and vulnerabilities faced by the IoT. An overview of the most important IoT security

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
… of attack types which might put critical threats to the security. Such attacks can be branched
into … However, we present them as passive attacks, since they do not imply major threat to the …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
… We also present a consolidated list of threats to IoT along with the vulnerabilities that can
be exploited to convert these threats into successful attacks. Another aspect that makes this …

Internet-of-things security and vulnerabilities: case study

G Alqarawi, B Alkhalifah, N Alharbi… - … of Applied Security …, 2023 - Taylor & Francis
… Section Attacks threats and vulnerabilities provide the current security issues that IOT
infrastructure faces at different layers are investigated. Section Countermeasures presents the …

[HTML][HTML] A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
… Then, known threats such as spyware, scareware, joke … Next, security vulnerabilities and
primarily used vulnerability … to the Internet must be sensitive to the threats posed by hackers …

Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things

IN McAteer, MI Malik, Z Baig, P Hannay - 2017 - ro.ecu.edu.au
Internet of Things (IoT) expands the global Internet-… threat-mitigation and can make the
end product vulnerable to cyber-attack. Through this paper, we present vulnerability and threat

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - … and Systems Security, 2018 - Springer
… , we systematically analyze the security threats and privacy … Another taxonomy of IoT security
and vulnerabilities is based … of IoT we used to analyze security threats and privacy issues. …