A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

IoT goes nuclear: Creating a ZigBee chain reaction

E Ronen, A Shamir, AO Weingarten… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Within the next few years, billions of IoT devices will densely populate our cities. In this
paper we describe a new type of threat in which adjacent IoT devices will infect each other …

A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …

A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues

G Sharma, S Vidalis, N Anand, C Menon, S Kumar - Electronics, 2021 - mdpi.com
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …

[PDF][PDF] A survey: DDOS attack on Internet of Things

K Sonar, H Upadhyay - International Journal of Engineering …, 2014 - academia.edu
Internet of Things refer as interconnection of smart object, included from small coffee
machine to big car, communicate with each other without human interactions also called as …

A survey on security issues in smart grids

P Jokar, N Arianpoo, VCM Leung - Security and …, 2016 - Wiley Online Library
A key feature of the smart grid is the introduction of two‐way data communications into the
power grid. This brings many security challenges, because of the large‐scale, difficult‐to …

Specification-based intrusion detection for home area networks in smart grids

P Jokar, H Nicanfar, VCM Leung - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Achievement of the goals of smart grid such as resilience, high power quality, and consumer
participation strongly depends on the security of this system. Along with the security …

Timestamp scheme to mitigate replay attacks in secure ZigBee networks

F Farha, H Ning, S Yang, J Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
ZigBee is one of the communication protocols used in the Internet of Things (IoT)
applications. In typical deployment scenarios involving low-cost and low-power IoT devices …

Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey

M Sharma, A Tandon, S Narayan… - 2017 3rd International …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are an emerging technology due to its huge number of
applications such as military investigations and civilian scenarios. Once deployed, these …