Anatomy of Threats to the Internet of Things

作者: Imran Makhdoom , Mehran Abolhasan , Justin Lipman , Ren Ping Liu , Wei Ni

DOI: 10.1109/COMST.2018.2874978

关键词:

摘要: The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e-Health…

参考文章(116)
Daniel Lowry Lough, Nathaniel J. Davis, A taxonomy of computer attacks with applications to wireless networks Virginia Polytechnic Institute and State University. ,(2001)
Dieter Uckelmann, Mark Harrison, Florian Michahelles, An Architectural Approach Towards the Future Internet of Things the internet of things. pp. 1- 24 ,(2011) , 10.1007/978-3-642-19157-2_1
Bassem Mokhtar, Mohamed Azab, Survey on Security Issues in Vehicular Ad Hoc Networks alexandria engineering journal. ,vol. 54, pp. 1115- 1126 ,(2015) , 10.1016/J.AEJ.2015.07.011
Sugata Sanyal, Tuhin Borgohain, Uday Kumar, Survey of Security and Privacy Issues of Internet of Things arXiv: Cryptography and Security. ,(2015)
Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen, Exploiting mobile social behaviors for Sybil detection 2015 IEEE Conference on Computer Communications (INFOCOM). pp. 271- 279 ,(2015) , 10.1109/INFOCOM.2015.7218391
Gaute Wangen, The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism Information-an International Interdisciplinary Journal. ,vol. 6, pp. 183- 211 ,(2015) , 10.3390/INFO6020183
Allison Lewko, Brent Waters, Decentralizing attribute-based encryption international cryptology conference. pp. 568- 588 ,(2011) , 10.1007/978-3-642-20465-4_31
François-Xavier Standaert, Introduction to Side-Channel Attacks Proceedings of DATE 2007, Secure Emmbedded Implementations Workshop. pp. 27- 42 ,(2010) , 10.1007/978-0-387-71829-3_2
Dan Boneh, Eu-Jin Goh, Kobbi Nissim, Evaluating 2-DNF Formulas on Ciphertexts Theory of Cryptography. pp. 325- 341 ,(2005) , 10.1007/978-3-540-30576-7_18
N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann, SEDA: Scalable Embedded Device Attestation computer and communications security. pp. 964- 975 ,(2015) , 10.1145/2810103.2813670