Threat modeling and security issues for the internet of things

A Seeam, OS Ogbeh, S Guness… - 2019 conference on …, 2019 - ieeexplore.ieee.org
… Moreover, this paper provides a threat model for all aforementioned areas and provide … a
threat model of the device being looked at. The threat model helps describing the attack surface …

Threat Modeling and IoT Attack Surfaces

S Raja, SS Manikandasaran, R Doss - … and Virtual Reality in IoT, 2022 - Springer
… Security of the IoT devices and data traveled between IoT devices are more vulnerable to
attacks. This chapter covers the real-time security tools and techniques to attack the IoT

Threat modeling of edge-based IoT applications

M Ficco, D Granata, M Rak, G Salzillo - … on the quality of information and …, 2021 - Springer
… Starting from the MITM threats of our threat model, we selected the MITM attack plans
specifically for the MQTT protocol [23]. The attack on which we focused requires the attacker to …

Threat model for securing internet of things (IoT) network at device-level

S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
… Furthermore, our research evaluates attack vectors for IoT devices that encompass three
central domains, including healthcare, commerce, and home. A synopsis of our contributions …

A threat modelling approach to analyze and mitigate botnet attacks in smart home use case

SG Abbas, S Zahid, F Hussain… - 2020 IEEE 14th …, 2020 - ieeexplore.ieee.org
… the threats in the earlier stages of the system design activity [10]. A threat model highlights
the … Villano, “Toward the automation of threat modeling and risk assessment in iot systems,” …

[HTML][HTML] Threat modeling—How to visualize attacks on IOTA?

I Ullah, G De Roode, N Meratnia, P Havinga - Sensors, 2021 - mdpi.com
… looking at security threats by applying threat modeling. State of … is conducted that employs
threat modeling to evaluate IOTA … IoT devices are vulnerable to wide span of security attacks […

Threat modeling of internet of things health devices

A Omotosho, B Ayemlo Haruna… - Journal of Applied …, 2019 - Taylor & Francis
… In this article, a threat model is designed for selected IoT … , device threats were identified
using the STRIDE model and … Also, threat modeling based on attack path analysis (T-MAP), …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
… In the IoT scenario, the identification of specific security requirements and the security … of
an IoT system by means of an almost completely automated process for threat modeling and risk …

TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)

K Saurabh, D Gajjala, K Kaipa, R Vyas… - Arabian Journal for …, 2024 - Springer
IoT system [11, 12]. In this paper, a quantitative threat modeling and path analysis method for
industrial IoT … for the implementation of the proposed model, one being the power industry (…

[HTML][HTML] Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach

SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz… - Sensors, 2021 - mdpi.com
… mitigate phishing attacks in IoT devices by analyzing the potential vulnerabilities, threats, …
By employing threat modelling, we identify the flaws that remained in IoT devices during the …