Security and Privacy in the Internet of Things 2021
DOI: 10.1002/9781119607755.ch10
|View full text |Cite
|
Sign up to set email alerts
|

IoT Hardware‐Based Security: A Generalized Review of Threats and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…Cyborg accounts are practically those in which a human occasionally and periodically takes over the bot account to respond to queries and comments of other users and to post some new authentic content. They are not only more expensive and time consuming to work, but also they are better hiders as robots 7 . Operators of such accounts also are often called "cyborgs" because of this mix of automated and "human" posts.…”
Section: Identification Of News Bots (Cyborgs)mentioning
confidence: 99%
“…Cyborg accounts are practically those in which a human occasionally and periodically takes over the bot account to respond to queries and comments of other users and to post some new authentic content. They are not only more expensive and time consuming to work, but also they are better hiders as robots 7 . Operators of such accounts also are often called "cyborgs" because of this mix of automated and "human" posts.…”
Section: Identification Of News Bots (Cyborgs)mentioning
confidence: 99%
“…Despite the benefits, various downsides are observed. IIoT-driven systems have weak security and privacy configurations, therefore they can be hacked by various network attacks [24], [25].…”
Section: Literature Reviewmentioning
confidence: 99%
“…IoT attacks can generally be classified into four categories [2][3][4][5]: physical attacks, cyberattacks, software attacks, and side-channel attacks. Side-channel attacks use information, such as sound, power, and time, leaked by a system (especially the cryptosystem) to crack the system (key) [6,7].…”
Section: Introductionmentioning
confidence: 99%