2019
DOI: 10.12720/jcm.14.10.958-964
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Internet of Things Security Risks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…Those three (3) layers are the device layer, the network layer, and the software layer [10] as depicted below in Figure 1. Some in the field break the network layer into two (2) parts; network and transport layers [9], [11]- [13]. While still others break the software layer down into two (2) separate layers.…”
Section: A Common Iot Security Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…Those three (3) layers are the device layer, the network layer, and the software layer [10] as depicted below in Figure 1. Some in the field break the network layer into two (2) parts; network and transport layers [9], [11]- [13]. While still others break the software layer down into two (2) separate layers.…”
Section: A Common Iot Security Architecturementioning
confidence: 99%
“…The routing of data between layers is conducted by physical network components such as routers, switches, and gateways. The transport of the data from devices to software is accomplished via a variety of protocols including MQTT, constrained application protocol (COAP), transmission control protocol (TCP) and the user datagram protocol (UDP) [7], [11], [13].…”
Section: Network Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Topic 5 is related to risk assessment and prioritization of IoT security threats. For a secure IoT environment, various Mobile Information Systems studies have prioritized security threats by applying approaches such as product-development life cycle, decisionmaking trial-and-evaluation laboratory, analytic network processing, and graph theory to develop risk assessment and management frameworks [200][201][202][203][204][205][206][207].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%