Unleashing iot security: Assessing the effectiveness of best practices in protecting against threats

P Pütz, R Mitev, M Miettinen, AR Sadeghi - Proceedings of the 39th …, 2023 - dl.acm.org
The Internet of Things (IoT) market is rapidly growing and is expected to double from 2020 to
2025. The increasing use of IoT devices, particularly in smart homes, raises crucial concerns …

A survey and analysis of recent IoT device vulnerabilities

MK Ryan, KY Rozier - 2024 - researchsquare.com
The cyber threat landscape is constantly shifting, especially in the evolutionary area of the
Internet of Things, which makes it vital to survey the vulnerabilities that are presently being …

Striking a balance between usability and cyber-security in IoT devices

S Dutta - 2017 - dspace.mit.edu
Today more and more physical objects are being connected to internet. The Internet of
Things, or loT, is dramatically changing the way of living and the way we interact with things …

Systematically evaluating security and privacy for consumer IoT devices

F Loi, A Sivanathan, HH Gharakheili… - Proceedings of the …, 2017 - dl.acm.org
Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are
being enthusiastically adopted by consumers, with numbers projected to rise to the billions …

Iota: A framework for analyzing system-level security of iots

Z Fang, H Fu, T Gu, P Hu, J Song… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT
applications, mobile apps, and the physical environment. However, existing IoT security …

Core cybersecurity feature baseline for securable IoT devices: A starting point for IoT device manufacturers

M Fagan, K Megas, K Scarfone, M Smith - 2019 - csrc.nist.gov
This publication is intended to help Internet of Things (IoT) device manufacturers understand
the cybersecurity risks their customers face so IoT devices can provide cybersecurity …

Stealing, spying, and abusing: Consequences of attacks on internet of things devices

J Valente, MA Wynn, AA Cardenas - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
We studied the security practices of a diverse set of Internet of Things (IoT) devices with
different architectures. We found vulnerabilities that can be exploited to launch novel attacks …

Security threats and possible countermeasures in IoT applications covering different industry domains

MG Samaila, JBF Sequeiros, MM Freire… - Proceedings of the 13th …, 2018 - dl.acm.org
The world is witnessing the emerging role of Internet of Things (IoT) as a technology that is
transforming different industries, global community and its economy. Currently a plethora of …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

Copsec: Compliance-oriented iot security and privacy evaluation framework

G Anselmi, AM Mandalari, S Lazzaro… - Proceedings of the 29th …, 2023 - dl.acm.org
A rising number of Internet of Things (IoT) security and privacy threats have been
documented over the last few years. However, IoT devices' domain designs are out-of-date …