Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
applications or servers which collect or analyze the data, so it is a very important to secure
… This paper reviews some attacks in the IoT applications and the security weaknesses in the …

Internet of Things applications: A systematic review

P Asghari, AM Rahmani, HHS Javadi - Computer Networks, 2019 - Elsevier
… The main advantage of this study is improving the security intentions of E-health IoT
applications. The weakness of this work is the absence of any detailed analysis of security metrics …

Health internet of things: Strengths, weakness, opportunity, and threats

L Gholamhosseini, F Sadoughi… - … Conference on Web …, 2019 - ieeexplore.ieee.org
… healthcare applicationssecurity issues such as physical protection for smart objects, privacy
and confidentiality of data have been considered during data collection in smart applications

Internet of Things security: A survey

FA Alaba, M Othman, IAT Hashem, F Alotaibi - … and Computer Applications, 2017 - Elsevier
… This study focuses on security threats and vulnerabilities in the context of the IoT and the …
an IoT security taxonomy based on the current security threats in the contexts of application, …

A potential weakness in RFID-based Internet-of-things systems

I Erguler - Pervasive and Mobile Computing, 2015 - Elsevier
… its security flaws by describing the attacks against it. In Section 6, in order to overcome
the vulnerabilities of AKE-MRFID we propose the improved scheme and examine its security

Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
… However, unlike our study, the authors did not consider security threats covered … security
threats on authorization schemes. In our survey, we consider threats and security weaknesses

Internet of Things: Security vulnerabilities and challenges

I Andrea, C Chrysostomou… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
… This paper attempts to capture a broader spectrum of the security vulnerabilities and attacks
in IoT systems. Our classification is unique compared to other classifications as it divides the …

[PDF][PDF] Internet of things: features, challenges, and vulnerabilities

E Alsaadi, A Tubaishat - … Journal of Advanced Computer Science and …, 2015 - elvedit.com
… the features, challenges, and weaknesses that will come about, as the IoT becomes reality
with the connection of more and more physical objects. Specifically, the study seeks to assess …

[PDF][PDF] Internet of things: a review of applications and technologies

S Vongsingthong, S Smanchat - Suranaree Journal of Science …, 2014 - researchgate.net
… The noticeable flaw of the system is security threats and attacks in the mobile network;
although GSM has adopted encryption as a protection mechanism, as it is wide-spread in nature, …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… In the end, this paper compares security issues between IoT and traditional … issues of IoT
as indivisible entity and try to find solutions to them. In the end, we compare security issues