2015
DOI: 10.13052/jcsm2245-1439.414
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

Abstract: Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
243
0
4

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 459 publications
(247 citation statements)
references
References 45 publications
0
243
0
4
Order By: Relevance
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Sicari et al (2015) and Jing et al (2014) discussed several key research challenges and identified potential solutions and research opportunities for IoT security, and Abomhara and Kien (2015) provided a categorisation of IoT related threats.…”
Section: Related Literaturementioning
confidence: 99%
“…Therefore, these sensor nodes are vulnerable to many software-based attacks like data sniffing, false packet injection, sleep deprivation, DoS attacks, etc. [11]. Piracy, reverse engineering, recycling, and tampering are the forms of hardware-based attacks that pose severe threats to the security of such systems which have been presented in Section 4.3.…”
Section: Future Directionsmentioning
confidence: 99%