A review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions

OSMBH Almazrouei, P Magalingam, MK Hasan… - IEEE …, 2023 - ieeexplore.ieee.org
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of
the domain and the increasing complexity of security threats. This study aims to address the …

Lightweight cryptography: a solution to secure IoT

SS Dhanda, B Singh, P Jindal - Wireless Personal Communications, 2020 - Springer
Abstract In Internet of Things (IoT), the massive connectivity of devices and enormous data
on the air have made information susceptible to different type of attacks. Cryptographic …

Deployment optimization of IoT devices through attack graph analysis

N Agmon, A Shabtai, R Puzis - Proceedings of the 12th conference on …, 2019 - dl.acm.org
The Internet of things (IoT) has become an integral part of our life at both work and home.
However, these IoT devices are prone to vulnerability exploits due to their low cost, low …

漫談輕量級密碼學標準發展與實現.

劉江龍 - Journal of Advanced Technology & Management, 2023 - search.ebscohost.com
摘要物聯網(Internet of Things, IoT) 的普及為生活帶來便利, 但也因為物聯網設備公開部署及
無線傳輸的特性, 產生了其他安全問題. 傳統加密標準難以或不可能在資源受限的設備中實現 …

Network portion risk assessment

A Raghuramu, AK Das, Y Zhang - US Patent 11,310,258, 2022 - Google Patents
Systems, methods, and related technologies for determining a risk associated with a network
portion are described. The determination of risk associated with a network portion may …

Comparison of security level and current consumption of security implementations for MQTT

F Carlsson, KG Eriksson - 2018 - diva-portal.org
IoT is a rapidly growing area with products in the consumer, commercial and industrial
market. Collecting data with multiple small and often battery-powered devices sets new …

The research on Diffie-Hellman-based IoT Sensor Node key management

S Hong, J Yu - Journal of the Korea Convergence Society, 2017 - koreascience.kr
Abstract Recently, the Internet of Things are developing in accordance with the technology
of implementation in low-cost, small-size, low power consumption and smart sensor that can …

Thesis Deployment Optimization of IoT Devices through Attack Graph Analysis

N Agmon - arXiv preprint arXiv:1911.06811, 2019 - arxiv.org
The Internet of things (IoT) has become an integral part of our life at both work and home.
However, these IoT devices are prone to vulnerability exploits due to their low cost, low …