A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT
暂无分享,去创建一个
Munam Ali Shah | Omair Ahmad Khan | Abdul Wahab Ahmed | M. A. Shah | Mian Muhammad Ahmed | A. Ahmed | O. A. Khan | M. Ahmed
[1] Jan L. Harrington. Denial of Service Attacks , 2005 .
[2] Jens-Peter E Kaps,et al. Cryptography for Ultra-Low Power Devices , 2006 .
[3] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[4] Ramaswamy Chandramouli,et al. State of security readiness , 2010, CROS.
[5] Julio C. Hernandez-Castro,et al. Attacking RFID Systems , 2010 .
[6] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[7] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[8] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[9] Kamal Dahbur,et al. A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.
[10] Wei You,et al. E2E: An Optimized IPsec Architecture for Secure and Fast Offload , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[11] Nagaraju Kilari,et al. A Survey on Security Threats for Cloud Computing , 2012 .
[12] Rakesh R. Bhavsar,et al. Data Security over Cloud , 2012 .
[13] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[14] Jinquan Zeng,et al. Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.
[15] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[16] Saeed Daneshmand,et al. A Low-Complexity GPS Anti-Spoofing Method Using a Multi-Antenna Array , 2012 .
[17] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[18] Patrick D. McDaniel,et al. Semantically rich application-centric security in Android , 2012 .
[19] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[20] Sarvesh Kumar,et al. Virtualization, The Great Thing and Issues in Cloud Computing , 2013 .
[21] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[22] Virendra Pal Singh,et al. Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .
[23] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[24] P. V. Dhawas,et al. A Secured Cost Effective Multi-Cloud Storage in Cloud Computing , 2013 .
[25] Hyunsoo Yoon,et al. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..
[26] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[27] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[28] Michael Schukat,et al. Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things , 2014, The 10th International Conference on Digital Technologies 2014.
[29] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[30] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[31] David Lake,et al. Internet of Things: Architectural Framework for eHealth Security , 2014, J. ICT Stand..
[32] Arif Sari. Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks , 2014 .
[33] Yacine Challal,et al. Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.
[34] Sanggon Lee,et al. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things , 2014, Sensors.
[35] Zahid Anwar,et al. Semantic security against web application attacks , 2014, Inf. Sci..
[36] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[37] Robert Green,et al. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.
[38] Panwit Tuwanut,et al. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).
[39] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[40] Jyoteesh Malhotra,et al. Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .
[41] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[42] Emil C. Lupu,et al. Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..
[43] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[44] Catalin Boja,et al. Internet of Things Based Systems for Food Safety Management , 2015 .
[45] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[46] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[47] C. Fung,et al. Value analysis of cyber security based on attack types , 2015 .
[48] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[49] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[50] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[51] Kanchan Kaushal,et al. DoS Attacks on different Layers of WSN: A Review , 2015 .
[52] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[53] Pg Student,et al. A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network , 2015 .
[54] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[55] Pascal Urien,et al. A new approach to investigate IoT threats based on a four layer model , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).
[56] Arun Agarwal,et al. Internet of Things (IoT) – A Technological Analysis and Survey on Vision, Concepts, Challenges, Innovation Directions, Technologies, and Applications ( An Upcoming or Future Generation Computer Communication System Technology ) , 2016 .
[57] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[58] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[59] Reema Abdulraziq,et al. Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): Survey , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[60] Jinjun Chen,et al. Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.
[61] Sathish Alampalayam Kumar,et al. Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[62] Mohammad Hammoudeh,et al. Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[63] Maslina Daud,et al. Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.
[64] Miroslav Vujić,et al. Classification of Security Risks in the IoT Environment , 2016 .
[65] Youngseop Kim,et al. An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).
[66] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[67] Muthu Ramachandran,et al. Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..
[68] N. Jeyanthi,et al. Security in IoT Devices , 2021, Research Anthology on Combating Denial-of-Service Attacks.
[69] Munam Ali Shah,et al. IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).
[70] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[71] Douglas C. Schmidt,et al. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..
[72] Sayan Kumar Ray,et al. A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .
[73] Long Chen. Security Management for The Internet of Things , 2017 .