A review on the security of the internet of things: Challenges and solutions

OI Abiodun, EO Abiodun, M Alawida… - Wireless Personal …, 2021 - Springer
Abstract The Internet of Things (IoT) has emerged as a modern wave of Internet
technologies that promises great transformation of life in areas such as smart health, smart …

IoT bugs and development challenges

A Makhshari, A Mesbah - 2021 IEEE/ACM 43rd International …, 2021 - ieeexplore.ieee.org
IoT systems are rapidly adopted in various domains, from embedded systems to smart
homes. Despite their growing adoption and popularity, there has been no thorough study to …

[HTML][HTML] The anatomy of a vulnerability database: A systematic mapping study

X Li, S Moreschini, Z Zhang, F Palomba… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …

A security analysis method for industrial Internet of Things

H Mouratidis, V Diamantopoulou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) provide an opportunity for industries to build large
interconnected systems that utilize various technologies, such as personal computers …

Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things

Z Yang, J He, Y Tian, J Zhou - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet
connectivity beyond traditional computing devices like computers and smartphones to the …

[HTML][HTML] The IoT security gap: a look down into the valley between threat models and their implementation

P Aufner - International Journal of Information Security, 2020 - Springer
We claim to have identified gaps between threat modeling frameworks, threat model use in
IoT security research and attacks that may be missed by current research. While security …

An interval type-2 fuzzy reasoning model for digital transformation project risk assessment

İ Gölcük - Expert Systems with Applications, 2020 - Elsevier
This study presents a new risk assessment model by combining interval type-2 fuzzy best-
worst method (IT2F-BWM) and perceptual reasoning for risk evaluation of digital …

Identifying security risks of digital transformation-an engineering perspective

A Nguyen Duc, A Chirumamilla - … for a Sustainable Society in the 21st …, 2019 - Springer
Technological advancements continue to disrupt how organizations compete and create
value in almost every industry and society. The recent digital transformation movement has …

Automated security assessment for the internet of things

X Duan, M Ge, THM Le, F Ullah, S Gao… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) based applications face an increasing number of potential security
risks, which need to be systematically assessed and addressed. Expert-based manual …

A systematic mapping study on internet of things challenges

A Lepekhin, A Borremans, I Ilin… - 2019 IEEE/ACM 1st …, 2019 - ieeexplore.ieee.org
The challenge of developing IoT-based systems has been found to be a complex problem. It
is influenced by number of factors: heterogeneous devices/resources, various perception …