2019
DOI: 10.1177/0020294019837991
|View full text |Cite
|
Sign up to set email alerts
|

Assessing risks and threats with layered approach to Internet of Things security

Abstract: Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 57 publications
0
20
0
Order By: Relevance
“…Table 5 shows specific attacks on technologies used with IoT solutions. Building on this, Aydos et al [85] propose a classification of the attacks according to the layers defined in the IoT architecture. Burhan et al [86] mention that security is a critical issue in IoT applications and describe some security mechanisms that can be used in the technologies that enable IoT, as shown in Table 6.…”
Section: Results Of the Analysis Of The Selected Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 5 shows specific attacks on technologies used with IoT solutions. Building on this, Aydos et al [85] propose a classification of the attacks according to the layers defined in the IoT architecture. Burhan et al [86] mention that security is a critical issue in IoT applications and describe some security mechanisms that can be used in the technologies that enable IoT, as shown in Table 6.…”
Section: Results Of the Analysis Of The Selected Papersmentioning
confidence: 99%
“…al. [85] propose a risk-based layered security approach based on the following four stages: (i) securing the layers; (ii) understanding and evaluating layered threats; (iii) measuring the likelihood of layered threats; and (iv) determining the layered risk by combining the probability and impact of the layered threat.…”
Section: A Discussionmentioning
confidence: 99%
“…Smart Home Monitoring System Using ESP32 Microcontrollers DOI: http://dx.doi.org /10.5772/intechopen.94589 Article [17] describes the design of a Smart home IoT system and notes the trade-off between scalability, security and data collection efficiency for the Internet-of-Things sensor networks. The article [18] discusses security risks in detail and states that IoT systems carry risks in terms of security and privacy. Without eliminating these risks, the IoT requirements are not adequately fulfilled.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Topic 5 is related to risk assessment and prioritization of IoT security threats. For a secure IoT environment, various Mobile Information Systems studies have prioritized security threats by applying approaches such as product-development life cycle, decisionmaking trial-and-evaluation laboratory, analytic network processing, and graph theory to develop risk assessment and management frameworks [200][201][202][203][204][205][206][207].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%