Threat model for securing internet of things (IoT) network at device-level
Tài liệu tham khảo
Minerva, 2015, Towards a definition of the Internet of Things (IoT), IEEE Internet Initiat., 13
Maple, 2017, Security and privacy in the internet of Things, 2017 J. Cyber Policy, 2, 155
Statista Research Department, “IoT: number of connected devices worldwide 2012-2025,” Statista, 19 Feb2020. Available at:https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Verizon Communications, Inc., “2018 Verizon Data Breach Investigations Report,” 11th ed, 2018.
Sruoginis, 2017
Katzis, 2016, The challenges of balancing safety and security in implantable medical devices
Cusack, 2017, Assessment of security vulnerabilities in wearable devices, 42
Rios, 2017
National Heart, Lung, and Blood Institute, “Pacemakers,” United States Department of Health and Human Services.
Roberti, 2015, The internet of hacked things, RFID J., 16
S. Northcutt, “The Attack Surface Problem,” SANS Technology Institute. Available at:https://www.sans.edu/cyber-research/security-laboratory/article/did-attack-surface
“Practical Ways to Misuse a Router,” Blogger.com, 16 June2017. Available at:http://blog.ptsecurity.com/2017/06/practical-ways-to-misuse-router.html
Kovacs, 2016
Lin, 2016, IoT privacy and security challenges for smart home environments, 2016 MDPI Journal, 7
Fernandes, 2016, Security analysis of emerging smart home applications, 22
Cusack, 2017, Evaluating IP surveillance camera vulnerabilities, 25
Cekerevac, 2017, Internet of things and the man-in-the-middle attacks - security and economic risks, MEST Journal, 5, 15, 10.12709/mest.05.05.02.03
Tweneboah-Koduah, 2017, Cyber security threats to IoT applications and service domains, 95, 169
Fan, 2016, A secure RFID application revocation scheme for IoT, 99, 2027
Mitrokotsa, 2016, Classifying RFID attacks and defenses, 12, 491
Kaur, 2016, A survey on security attacks in wireless sensor networks, Int. J. Adv. Res. Comput. Sci., 7, 10
Wu, 2017, A countermeasure to SQL injection attack for cloud environment, Wirel. Pers. Commun., 96, 5279, 10.1007/s11277-016-3741-7
Alexiou, 2016, Formal security analysis of near field communication using model checking, Comput. Secur., 60, 1, 10.1016/j.cose.2016.03.002
Islam, 2015, 3, 678
Drepeper, 2009, 8
Felt, 2011, The effectiveness of application permissions, 15
E. Rescorla and N. Modadugu, “Data Transport Layer Security 1.2,” The Internet Society, April 2006. ISSN: 2070-1721
Tschofenig, 2016
Sen, 2009, A survey on wireless sensor network security, Int. J. Commun. Netw. Inf. Secur., 1, 55
Kang, 2015, Button-based method for the prevention of near field communication relay attacks, Int. J. Commun. Syst., 28, 1628, 10.1002/dac.2751
Duhan, 2014, A two-tier defence against SQL injection, 12
Pipetti, 2018, An attack vector for IoT networks
Martin, 2004, Denial-of-service attacks on battery-powered mobile computers, 309
Rizvi, 2020, Identifying the attack surface for IoT network, Internet Things, 9, 10.1016/j.iot.2020.100162
S. Rizvi, N. McIntyre and J. Ryoo, “Computing security scores for IoT device vulnerabilities,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria, (in press).
Shakhov, 2018, 18
“The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast,” IDC, 18-Jun-2019. Available at:https://www.idc.com/getdoc.jsp?containerId=prUS45213219.
2016, Healthcare IoT device installations: global estimates 2020, Statista, 26
2019, IoT-focused cyberattacks are the new normal, Irdeto, 03
Shwartz, 2018, Opening Pandora’s box: effective techniques for reverse engineering IoT devices, 1