Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

Advances in IOT security: Vulnerabilities, enabled Criminal Services, attacks and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

Threat model for securing internet of things (IoT) network at device-level

S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
Abstract The Internet of Things (IoT) creates a theoretical bridge between end-users and the
digital world. The IoT embodies a massive group of interconnected computing devices …

IoTSAT: A formal framework for security analysis of the internet of things (IoT)

M Mohsin, Z Anwar, G Husari… - … IEEE conference on …, 2016 - ieeexplore.ieee.org
The new attack surface being crafted by the huge influx of IoT devices is both formidable and
unpredictable, as it introduces a rich set of unexplored attack techniques and unknown …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

[HTML][HTML] The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT-based security attacks

M Shafiq, Z Gu, O Cheikhrouhou, W Alhakami… - … and Mobile Computing, 2022 - hindawi.com
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT-based security attacks. It is designed for software …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges

R Nath, HV Nath - Computers and Electrical Engineering, 2022 - Elsevier
As an emerging technology, the Internet of Things (IoT) is revolutionizing the global
economy and society. The wide adoption of IoT opens up new security and privacy …

A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …