2023
DOI: 10.3390/electronics12051176
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Consumer IoT Device Vulnerability Quantification Frameworks

Abstract: The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has made them more appealing to attackers. Cyberattacks on IoT devices have the potential to expose sensitive data, disrupt operations, and even endanger lives. As a result, IoT security has recently gained traction in both industry and academia. However, no research has examined existing IoT vulnerability assessment frameworks in a systematic and comprehensive manner. To address this gap, this paper systematically review… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 80 publications
0
2
0
Order By: Relevance
“…Strategic and tactical resilience models must be created to fully address system risks [43]. In determining the level of vulnerability in the digitalization capability framework, these models consider the vulnerability and reliability levels of hardware and software resources, as well as the functions of physical proximity and networking [44,45]. Creating a robust matrix framework for resilience indicators based on a four-stage lifecycle model: planning/preparation, absorption, recovery, and adaptation.…”
Section: Cyber Resilience Frameworkmentioning
confidence: 99%
“…Strategic and tactical resilience models must be created to fully address system risks [43]. In determining the level of vulnerability in the digitalization capability framework, these models consider the vulnerability and reliability levels of hardware and software resources, as well as the functions of physical proximity and networking [44,45]. Creating a robust matrix framework for resilience indicators based on a four-stage lifecycle model: planning/preparation, absorption, recovery, and adaptation.…”
Section: Cyber Resilience Frameworkmentioning
confidence: 99%
“…Currently, mode-based is the most widely adopted identity proofing method in arbitrary systems, which incorporating password [18], FIDO [19], pattern [20], and one-time password [21]. Although it offers users convenience, the authentication process is potentially under risk of rainbow tables [22], device vulnerability password leakage [23][24], and OTP interception malware [25].…”
Section: Fig 2 Various Categories Of User Authenticationmentioning
confidence: 99%