IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… a broad overview of the security risks in the IoT sector and to discuss some … to security in
the IoT domain, we discuss the specific security mechanisms adopted by the most popular IoT

Internet of things (iot) security vulnerabilities: A review

R Ramadan - PLOMS AI, 2022 - plomscience.com
… usually lack advanced data encryption and device authentication. The hardware … in IoT
devices are not high-end, and therefore, the integrity and security of the majority of IoT devices

Internet of Things: Security vulnerabilities and challenges

I Andrea, C Chrysostomou… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
… within Internet propagate to IoT as well. Furthermore, the fast development and wider adoption
of IoT devices in our lives signifies the urgency of addressing these security threats before …

System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats

SK Choi, CH Yang, J Kwak - KSII Transactions on Internet and …, 2018 - koreascience.kr
… minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT
… of malware existing in an IoT device, as well as accessing the IoT device, in this study. The …

An experimental analysis of security vulnerabilities in industrial IoT devices

X Jiang, M Lora, S Chattopadhyay - ACM Transactions on Internet …, 2020 - dl.acm.org
… During our vulnerability analysis, we will gain control of the actuators and make … vulnerabilities
in a typical IIoT device to characterize its attack surfaces and vectors. We use the device

[PDF][PDF] Analysis of Security Vulnerabilities for IoT Devices.

HH Kim, J Yoo - Journal of Information Processing Systems, 2022 - jips-k.org
… to reducing the occurrence of security vulnerabilities in companies that produce IoT … can
be used to examine the vulnerabilities of IoT device systems and evaluate IoT system security. …

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

R Williams, E McMahon, S Samtani… - … and Security …, 2017 - ieeexplore.ieee.org
… value, they also present new security vulnerabilities that can have a … IoT device vulnerabilities,
this study aims to perform a large-scale vulnerability assessment of consumer IoT devices

Internet of Things (IoT): Application systems and security vulnerabilities

J Ahamed, AV Rajan - … conference on electronic devices …, 2016 - ieeexplore.ieee.org
IoT applications, their security vulnerabilities and their impacts. This research paper analysed
various IoT … smart health as the major IoT applications for UAE and looked at the various …

[HTML][HTML] A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
… and built botnets by manipulating the controlled devices. It launched Tbps-level denial-of-…
IoT devices, the proliferation of security vulnerabilities will bring severe risks to the security

[HTML][HTML] Security vulnerabilities in Bluetooth technology as used in IoT

AM Lonzetta, P Cope, J Campbell, BJ Mohd… - Journal of Sensor and …, 2018 - mdpi.com
… As a result, it has serious security vulnerabilities, and the need for awareness of the security
… an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and …