A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
2021
Applied Sciences
To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. ...
By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based ...
Need for Categorisation As stated previously, the fourth stage of cyber attacks consists of performing various attacks upon a target system. ...
doi:10.3390/app11167228
fatcat:otk56tjrqrd7ffcpcajea62atq
A Technical Review of Wireless security for the Internet of things: Software Defined Radio perspective
[article]
2020
arXiv
pre-print
This paper presents a review of the vulnerabilities of the wireless technologies that bear the IoT and assessing the experiences in implementing wireless attacks targeting the Internet of Things using ...
Most attacks at this level occur due to limitations in hardware, physical exposure of devices, and heterogeneity of technologies. ...
INTRODUCTION On September 5 and 6, 2019 a cyber-attack affected several Wikipedia sites in Europe -including Germany, France,Italy and Poland, at the same time as parts of the Middle East [1] .IoT devices ...
arXiv:2009.10171v1
fatcat:u77yn7fohbedtjqpqjsmnxpar4
Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure
2021
Applied Sciences
However, IoT-based critical infrastructures are an appealing target for cybercriminals. ...
As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. ...
As more vulnerable IoT devices come online, they create a very large attack surface, which increases the potential scale and severity of massive DDoS attacks targeting critical cyber infrastructure. ...
doi:10.3390/app11104580
fatcat:6qkkahey2rd6jazfucx55zep4e
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
2020
IEEE Access
Various research studies [15] - [17] have demonstrated that various IoT devices are not secured properly against cyber-attacks. ...
However, cyber-attackers can compromise IoT devices, and cause disruptions to occur, by either manipulating the input/output data of IoT devices, or by disabling them as a result of DoS attacks [195] ...
doi:10.1109/access.2020.3036728
fatcat:7kbdcvfwmvextpmrgo4mc2qgyq
A First Step Towards Understanding Real-world Attacks on IoT Devices
[article]
2020
arXiv
pre-print
With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them. ...
In doing so we were able to attract increasingly sophisticated attack data. We present the design of this honeypot ecosystem and our observation on the attack data so far. ...
The emerging of IoT devices could significantly change the landscape of cyber-attacks both in terms of motives and methods. ...
arXiv:2003.01218v1
fatcat:ey34gwllvngxdnvl7hzjsxdsga
Comprehensive Analysis of IoT Malware Evasion Techniques
2021
Engineering, Technology & Applied Science Research
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. ...
This paper presents a survey of IoT malware evasion techniques, reviewing and discussing various researches. ...
VARIOUS MALWARE ATTACKS IN IOT In [36] , malware targeting mobile devices was explored as a considered serious threat. ...
doi:10.48084/etasr.4296
fatcat:hyfkdspwizce3cyeu6erygpqai
Secure Internet of Things (IoT)-based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities
2019
IEEE Access
The widespread adoption of the Internet of Things (IoT) technologies has drastically increased the breadth and depth of attack surfaces in networked systems, providing new mechanisms for the intrusion. ...
Moreover, we provide a broad collection of attack examples upon each of the key applications. ...
In Section IV, we present a study of cyber-attacks on IoT applications, outlining attack targets, examples, and impacts. ...
doi:10.1109/access.2019.2920763
fatcat:35wpzxezujcf5m6fjedlcmutny
Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review
2019
IEEE Access
In the complex connected system of SG, cyber security becomes a critical issue; IoT devices and their data turning into major targets of attacks. ...
Connectivity lies at the core of this new grid infrastructure, which is provided by the Internet of Things (IoT). ...
The vulnerability of IoT devices to cyber-attacks rated them the most probable way of attacking both in 2016 and 2017 [191] , [192] . ...
doi:10.1109/access.2019.2894819
fatcat:2525icn33resjpigdjk45svyq4
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
2016
2016 IEEE Congress on Evolutionary Computation (CEC)
However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems ...
in IoT enabled cyber physical systems, and data driven cybersecurity. ...
Since data from IoT devices or in the cloud provide various clues of cybersecurity threats, data-driven cybersecurity has great potentials for protecting IoT assets. ...
doi:10.1109/cec.2016.7743900
dblp:conf/cec/HeMWTMJG16
fatcat:6ghbtw2bhfbzzgycfzhtcrh3te
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things
2021
The Review of Socionetwork Strategies
This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. ...
self-assessment of IoT cyber risk posture. ...
The Review of Socionetwork Strategies (2021) 15:381-411 Acknowledgements Eternal gratitude to the Fulbright Visiting Scholar Project. ...
doi:10.1007/s12626-021-00086-5
pmid:35506054
pmcid:PMC8297719
fatcat:av4bgvy54nctxl5w45kfo2ahoy
Security and Privacy in Smart Farming: Challenges and Opportunities
2020
IEEE Access
Such cyber attacks have the potential to disrupt the economies of countries that are widely dependent on agriculture. ...
Smart devices are widely used by a range of people from farmers to entrepreneurs. ...
Leckie, Associate Professor in the School of Agriculture at Tennessee Technological University, for his domain expertise, insightful comments, and suggestions, to make this manuscript more comprehensible ...
doi:10.1109/access.2020.2975142
fatcat:3s7cmur2jrghzh3yxdsmklbh7m
A Survey on Security Attacks with Remote Ground Robots
2021
El-Cezeri: Journal of Science and Engineering
One of the main contributions of the paper is to present cyber-attacks on wearable e-health devices with ground robots. ...
In this paper, several cyber-attacks on Ehealth systems are explored. Particularly, we have focused on attacks to IoT based wearable health devices for body area networks. ...
Therefore, E-health systems have become one of the main targets of cyber criminals, who may use ground robots to carry out cyber-attacks. ...
doi:10.31202/ecjse.916532
fatcat:zh6avv42cfgjjlipycjtm4x2gu
Artificial Intelligence technology in internet of Things cybersecurity
2021
figshare.com
Cyber-attackers, on the other hand, have worked out how to abuse AI and have even startedusing adversarial AI to carry out cybersecurity assaults. ...
The use of the Internet of Things (IoT) has exploded in recent years, and with it has come an increase in cybersecurityconcerns. ...
ATTACKING IOT DEVICES METHODS Due to the lack of security in many IoT devices, cybercriminals have devised a variety of methods to target IoT devices from a variety of attack surfaces. ...
doi:10.6084/m9.figshare.14938101.v1
fatcat:togmyga2r5dpnio7rnrtp5yh6u
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis
2021
IEEE Access
To detecting various types of cyber threats against industrial cyber physical systems, Li et al. ...
CYBER PHYSICAL SYSTEMS Cyber physical systems process multi-source and largescale data in various domains of application. ...
He was a recipient of the 2021 IEEE TEM BEST PAPER AWARD. His current H-index is 21, i10-index is 35 ...
doi:10.1109/access.2021.3118642
fatcat:222fgsvt3nh6zcgm5qt4kxe7c4
Leveraging Side-channel Information for Disassembly and Security
2019
ACM Journal on Emerging Technologies in Computing Systems
have been increasingly targeted with a variety of cyber attacks. ...
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical devices, smart home appliances as well as traditional computing platforms such as personal computers and servers ...
INTRODUCTION With the advent of the Internet of Things (IoT), embedded devices, and networked high performance computation platforms and data centers, various cyber attacks such as malware, ransomware, ...
pmid:32863796
pmcid:PMC7450766
fatcat:hefsx3i2hzdulhaxcj5wcvjbfm
« Previous
Showing results 1 — 15 out of 2,653 results