Assessing vulnerabilities and IoT-enabled attacks on smart lighting systems

I Stellios, K Mokos, P Kotzanikolaou - European Symposium on Research …, 2021 - Springer
The rapid evolution of the Internet-of-Things (IoT) introduces innovative services that span
across various application domains. As a result, smart automation systems primarily …

Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services

I Stellios, K Mokos, P Kotzanikolaou - Connection Science, 2022 - Taylor & Francis
Internet-of-Things (IoT) extends the provision of remotely managed services across different
domains. At the same time, IoT devices primarily designed for home environments may also …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …

Automated risk analysis for IoT systems

M Rak, V Casola, A De Benedictis, U Villano - Advances on P2P, Parallel …, 2019 - Springer
Designing and assessing the security of IoT systems is very challenging, mainly due to the
fact that new threats and vulnerabilities affecting IoT devices are continually discovered and …

ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems

M Rak, G Salzillo, D Granata - Computers and Electrical Engineering, 2022 - Elsevier
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …

Striped: A threat analysis method for iot systems

K Srikumar, K Kashish, K Eggers… - Proceedings of the 17th …, 2022 - dl.acm.org
Currently, IoT systems display a poor level of security, as 50% of IoT devices are vulnerable
to severe attacks, according to research. In an attempt to ameliorate the situation, we …

Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks

JA Font, J Jarauta, R Gesteira… - 2023 JNIC …, 2023 - ieeexplore.ieee.org
The development of Internet of Things technologies has brought, along with new
opportunities, new types of risks to the table. This is exemplified by attacks like the …

[HTML][HTML] Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity

HA Abdulghani, A Collen, NA Nijdam - Sensors, 2023 - mdpi.com
Internet of Things (IoT) faces security concerns different from existing challenges in
conventional information systems connected through the Internet because of their limited …

Investigation of vulnerabilities on smart grid end devices

Y Gui, AS Siddiqui, SM Tamore… - 2019 IEEE CyberPELS …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) are paradigm shift transforming embedded objects into a smart
connected device, ready to sense, analyze and communicate information with other devices …

Asset-driven approach for security risk assessment in IoT systems

S Chehida, A Baouya, DF Alonso, PE Brun… - Risks and Security of …, 2021 - Springer
The growth of damage caused by security issues in IoT-based systems requires the
definition of a rigorous methodology allowing risks assessment and protecting the system …