2023
DOI: 10.1109/jiot.2023.3252594
|View full text |Cite
|
Sign up to set email alerts
|

Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 67 publications
1
7
0
Order By: Relevance
“…This finding is in harmony with the strategic capacity of ERM to systematically identify and manage risks [11,14], enhanced by the structured risk management processes provided by ISO 27001 [30,31] and bolstered by the specialized investigative capabilities of mobile forensics [38,40]. This supports the assertion that a cohesive application of these methodologies significantly improves risk management outcomes compared to disjointed approaches, addressing both the strategic and tactical dimensions of digital risk management [2,6]. The integration effectively leverages ERM's comprehensive risk assessment, ISO 27001's information security controls, and mobile forensics' investigative insights, creating a more adequate and effective risk management strategy.…”
Section: Discussionsupporting
confidence: 66%
“…This finding is in harmony with the strategic capacity of ERM to systematically identify and manage risks [11,14], enhanced by the structured risk management processes provided by ISO 27001 [30,31] and bolstered by the specialized investigative capabilities of mobile forensics [38,40]. This supports the assertion that a cohesive application of these methodologies significantly improves risk management outcomes compared to disjointed approaches, addressing both the strategic and tactical dimensions of digital risk management [2,6]. The integration effectively leverages ERM's comprehensive risk assessment, ISO 27001's information security controls, and mobile forensics' investigative insights, creating a more adequate and effective risk management strategy.…”
Section: Discussionsupporting
confidence: 66%
“…Furthermore, TCP variants are vulnerable to blind TCP injection attacks, where attackers inject malicious payloads into ongoing TCP connections without directly observing the communication stream. By predicting or guessing sequence numbers used in TCP connections, attackers can inject forged packets into the communication stream, impersonate legitimate endpoints, or manipulate data exchanges [179]. Blind TCP injection attacks can exploit vulnerabilities in network services or applications, bypass security controls, or compromise sensitive information.…”
Section: Common Vulnerabilities In Tcpmentioning
confidence: 99%
“…The authors consider the problems and vulnerabilities that arise as a result of the introduction of cloud computing in IoT systems, and also identify future research directions. Also, a similar study is conducted in [10], where the authors analyze potential attacks in IoT systems, as well as known countermeasures. These studies examine security protocols, encryption methods, and access control mechanisms to address security issues and protect sensitive data.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%