… The InternetofThings (IoT) is a rapidly growing subset of our modern computing architecture, and as such, provides significant new attacksurface… considerations including IoTnetwork ar…
P Chaudhary, B Gupta, AK Singh - Telecommunication Systems, 2022 - Springer
… IoT platform has become the fascinating attackssurface to launch various types of cyber-… We prepare the dataset through simulating the IoTnetwork by connecting different IoT devices …
… AttackSurface and Security Issues To map the attacksurface of a system, one should consider the … The network layer connects the end nodes to network devices, servers or other …
S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
… IoTattacksurface is presented for an IoTnetwork [34]. Authors analyze the IoTnetwork for vulnerabilities and present an attacksurface … the nuances between common IoT domains and …
H Meziane, N Ouerdi, MA Kasmi, S Mazouz - Emerging Trends in ICT for …, 2021 - Springer
… attacksurfaces in IoT. To do this, it seems necessary to start with an analysis of existing classifications of IoTattacks and to … attacks against IoTnetwork at high level without analyzing the …
I Ullah, QH Mahmoud - Canadian conference on artificial intelligence, 2020 - Springer
… The exponential growth will make an IoT a smart object for the attackers to accomplish malicious activities and increase the attacksurface of IoTnetworks. The effects of cyber-attacks …
… a Wi-Fi network with respect to IoT Sentinel. We explain the attacker goals, attacksurface, and … We consider that the attacks on the devices and network are remote rather than physical. …
VV Rao, R Marshal, K Gobinath - 2021 4th International …, 2021 - ieeexplore.ieee.org
… attacksurface and the rise of attacks against IoT devices. The heterogeneous nature of IoT network makes IoT supply chain threats to be one of the most critical attacks in the future. The …
… investigate vulnerabilities of IoT systems from the perspectives of the network layer, operating … ) network model, we consider attacksurfaces to reside primarily in the network application …