Security analysis on consumer and industrial IoT devices

J Wurm, K Hoang, O Arias… - 2016 21st Asia and …, 2016 - ieeexplore.ieee.org
… our security analysis of a sample commercial IoT device and reveals security vulnerabilities
which exist in many commercial IoT … The analysis will show us that industrial IoT devices are …

Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
… A comprehensive and in-depth security analysis of IoT devices has been made in light of …
potential security threats. In this paper, the security challenges and problems of IoT devices are …

Design-level and code-level security analysis of IoT devices

FM Tabrizi, K Pattabiraman - ACM Transactions on Embedded …, 2019 - dl.acm.org
… that IoT devices provide opportunities for both design-level and code-level security analysis.
… a code-level analysis technique for analyzing the security of IoT devices, and we compare …

Security analysis and prevention of attacks on IoT devices

A Raghuprasad, S Padmanabhan… - 2020 International …, 2020 - ieeexplore.ieee.org
devices on a mass scale. But what they are missing out on is taking care of the security part
of these IoT devicesIoT devices face numerous threats these days with the ease of access to …

Security analysis of IoT protocols: A focus in CoAP

RA Rahman, B Shah - … 3rd MEC international conference on big …, 2016 - ieeexplore.ieee.org
… the security of the protocol and manages threats. However, there has been a lack of key
research on how security … This research presents a security analysis and examines the current …

Performance analysis of security algorithms for IoT devices

N Khan, N Sakib, I Jerin, S Quader… - 2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
… understanding performance of aIoT device by having a look … to design security structure for
any specific IoT device. Again, … a succinct manneron security issues for those devices. Overall …

[PDF][PDF] Analysis of Security Vulnerabilities for IoT Devices.

HH Kim, J Yoo - Journal of Information Processing Systems, 2022 - jips-k.org
IoT device system. The results of this study can be used to examine the vulnerabilities of IoT
device systems and evaluate IoT system security… Kim, “Threat-based security analysis for the …

IoTSAT: A formal framework for security analysis of the internet of things (IoT)

M Mohsin, Z Anwar, G Husari… - … and network security …, 2016 - ieeexplore.ieee.org
… In this paper, we present a security analysis framework … security requirements and mission
objectives. We achieve this by developing two higher-level models applicable to generic IoT

ASTo: A tool for security analysis of IoT systems

O Mavropoulos, H Mouratidis, A Fish… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
security analysis of IoT systems is presented. The tool, named ASTo (Apparatus Software
Tool) enables the visualization of IoT … concepts of an IoT system along with security concepts. …

Security and attack vector analysis of IoT devices

M Capellupo, J Liranzo, MZA Bhuiyan… - Security, Privacy, and …, 2017 - Springer
… , and full control of the device without any authentication. We also … security vectors used to
attack IoT devices, as well as the most recent malwares in control of over a million IoT devices