2020
DOI: 10.3390/en13184813
|View full text |Cite
|
Sign up to set email alerts
|

IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids

Abstract: In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 52 publications
0
26
0
Order By: Relevance
“…Lightweight M2M (machine to machine) has become a standard for low memory, lightweight devices that typically find an application in IoT [ 44 ]. However, such a dynamic approach is disrupted by some of the significant threats by the intruder [ 3 , 9 , 21 ].…”
Section: Background and Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…Lightweight M2M (machine to machine) has become a standard for low memory, lightweight devices that typically find an application in IoT [ 44 ]. However, such a dynamic approach is disrupted by some of the significant threats by the intruder [ 3 , 9 , 21 ].…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…Tesla motors faced the causality in the smart car accident all due to the compromised sensors [ 144 ]. Anand et al [ 3 ] discussed the use-case of smart transportation covering the common attack surfaces and inherent vulnerabilities.…”
Section: Case Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Such type of battery drainage attacks results in node outage and network connection loss. Battery drainage attacks prevent the node to perform its routine functioning 7 . The main factors that lead to such attacks are unauthorized access, battery drainage, code injection, and sleep deprivation.…”
Section: Introductionmentioning
confidence: 99%
“…CoAP is operated over UDP and MQTT runs over TCP. MQTT 7 is meant for constrained devices and it mitigates the overhead of HTTP protocol. Moreover, MQTT is considered as a good choice for IoT devices that are operated on batteries 75…”
Section: Introductionmentioning
confidence: 99%