2020 15th International Conference on Computer Engineering and Systems (ICCES) 2020
DOI: 10.1109/icces51560.2020.9334589
|View full text |Cite
|
Sign up to set email alerts
|

Security Framework for Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 8 publications
0
0
0
Order By: Relevance
“…[28] presented a taxonomy of security requirements that should be considered when a software application is designed and implemented. [19] proposed a security architecture to provide security enabled IoT services and a baseline for security deployment. Their architectural solution plays a crucial role in their study because it addresses the security requirements of IoT systems.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[28] presented a taxonomy of security requirements that should be considered when a software application is designed and implemented. [19] proposed a security architecture to provide security enabled IoT services and a baseline for security deployment. Their architectural solution plays a crucial role in their study because it addresses the security requirements of IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Their approach includes activities such as requirements development, domain-specific design, verification, simulation, analysis, calibration, deployment, code generation, and execution [28] presented a taxonomy of security requirements to be considered when a software application is designed and implemented. [19] proposed a security architecture to provide security-enabled IoT services and a baseline for security deployment. [29] established security requirements for IoT systems and focused on enhancing the security of smart home applications.…”
Section: Scenario Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…In case the vulnerabilities are not detected, they can be exploited, which leads to attacks on the IoT. In [27], the authors classified the different types of IoT attacks. Table 5 presents a summary of IoT attacks, including their description, subcategories, examples, advantages from the attackers' perspective, and cost factors.…”
Section: Development Of Exploits and Pocsmentioning
confidence: 99%
“…More billions of IoT devices increases the threat and opens up the possibility of numerous attacks on the devices themselves. To address these security challenges, it is essential to explore frameworks like the 'Security Framework for Internet of Things proposed by El-Gendy and Azer [2]. Hacked devices cause disruption of connectivity and can also serve as a starting point for attacks on other devices and systems.…”
Section: Introductionmentioning
confidence: 99%