Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations

HA Noman, OMF Abu-Sharkh - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has transformed various domains in our lives by enabling
seamless communication and data exchange between interconnected devices …

The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks

M Shafiq, Z Gu, O Cheikhrouhou… - Wireless …, 2022 - Wiley Online Library
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT‐based security attacks. It is designed for software …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P Xiong, S Iqbal - Journal of Information and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

Stealing, spying, and abusing: Consequences of attacks on internet of things devices

J Valente, MA Wynn, AA Cardenas - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
We studied the security practices of a diverse set of Internet of Things (IoT) devices with
different architectures. We found vulnerabilities that can be exploited to launch novel attacks …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

IoT threat detection advances, challenges and future directions

NM Karie, NM Sahri… - 2020 workshop on …, 2020 - ieeexplore.ieee.org
It is predicted that, the number of connected Internet of Things (IoT) devices will rise to 38.6
billion by 2025 and an estimated 50 billion by 2030. The increased deployment of IoT …