Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

[HTML][HTML] The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT-based security attacks

M Shafiq, Z Gu, O Cheikhrouhou, W Alhakami… - … and Mobile Computing, 2022 - hindawi.com
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT-based security attacks. It is designed for software …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - Journal of Hardware and …, 2018 - Springer
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …

Threat model for securing internet of things (IoT) network at device-level

S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
Abstract The Internet of Things (IoT) creates a theoretical bridge between end-users and the
digital world. The IoT embodies a massive group of interconnected computing devices …