A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

[HTML][HTML] Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a Method for Actively Preventing Cyberattacks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Complexity of systems are increasing day by day. This leads to more and more
vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …

A survey on internet of things security from data perspectives

J Hou, L Qu, W Shi - Computer Networks, 2019 - Elsevier
Abstract As the Internet of Things (IoT) sees an increasing use in the society, the security
challenge it faces is becoming more and more severe. Data collected and shared in the IoT …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …