2019
DOI: 10.14569/ijacsa.2019.0101048
|View full text |Cite
|
Sign up to set email alerts
|

Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey

Abstract: The Internet of things is no longer a concept; it is a reality already changing our lives. It aims to interconnect almost all daily used devices to help them exchange contextualized data in order to offer services adequately. Based on the existing Internet, IoT suffers indisputably from security issues that could threaten its evolution and its users' interests. Starting from this fact, we try to define the main security threats for the IoT perimeter and propose some pertinent solutions. To do so, we first esta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…In [14], the authors described the design of a home automation system using dual-tone multiple frequencies (DTMF) based home automation system. The purpose of this DTMF based home automation is to develop an embedded system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [14], the authors described the design of a home automation system using dual-tone multiple frequencies (DTMF) based home automation system. The purpose of this DTMF based home automation is to develop an embedded system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The development of a security assessment framework for cyber-physical systems was conducted by investigating the DNP3 protocol's resistance to attacks, including passive network monitoring, response replay requirements, rogue interoperations, buffer flooding, and TCP veto [15]. Through vulnerability and penetration testing, MITM attacks were modeled using grid technology to evaluate cybersecurity threats to SCADA systems implementing DNP3 protocols [42]. Two attack scenarios were used: an unsolicited message attack and injection data collection [43].…”
Section: Related Workmentioning
confidence: 99%
“…3) Network Latency: Network Latency is defined as the difference of the taken time between the sending and the receiving of a packet via the DADOG path [25], [28]. The total of latency as mentioned in equation (2).…”
Section: Building the Testbed Scenariomentioning
confidence: 99%
“…IPv6 Low Power Area Network (6LoWPAN) is one of the IP-based communication technologies in WSN [1]. It allows a huge number of embedded devices to be connected directly to the internet (end to end communication) by using the large available IPv6 address space [2][3] [4]. In these technologies, the transmission packets from a source node to destinations node over IEEE 802.15.4 based network using the multi-hop communication as we known wireless mesh network.…”
Section: Introductionmentioning
confidence: 99%