2015 IEEE Symposium on Computers and Communication (ISCC) 2015
DOI: 10.1109/iscc.2015.7405513
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things: Security vulnerabilities and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
199
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 380 publications
(203 citation statements)
references
References 29 publications
0
199
0
2
Order By: Relevance
“…DOS attacks either disable the IoT device itself or use a compromised IoT device in order to launch other DoS attacks. 34 The first approach aims to overwhelm the lightweight communication channel that is utilized. The second approach takes advantage of weak security and maintenance (eg, default authorization credentials set by the vendor of the IoT device are not changed or the owner of the IoT device fails to regularly update the device's firmware and software), which often exists in many of these devices.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
“…DOS attacks either disable the IoT device itself or use a compromised IoT device in order to launch other DoS attacks. 34 The first approach aims to overwhelm the lightweight communication channel that is utilized. The second approach takes advantage of weak security and maintenance (eg, default authorization credentials set by the vendor of the IoT device are not changed or the owner of the IoT device fails to regularly update the device's firmware and software), which often exists in many of these devices.…”
Section: Common Attacks On Iot Devicesmentioning
confidence: 99%
“…Andrea et al 15 have presented a classification of attacks in IoT based on four layers of IoT, ie, the perception or physical, network, software, and encryption attacks. Andrea et al 15 have presented a classification of attacks in IoT based on four layers of IoT, ie, the perception or physical, network, software, and encryption attacks.…”
Section: Perception Layermentioning
confidence: 99%
“…Andrea et al [13] think of another characterization of IoT gadgets assaults exhibited in four particular sorts: 1) physical; 2) arrange; 3) programming; and 4) encryption assaults. Every one covers a layer of the IoT structure (physical, arrange, and application), notwithstanding the IoT conventions for information encryption.…”
Section: Classifications On Iot Attacksmentioning
confidence: 99%