2017
DOI: 10.1007/s11277-017-4434-6
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Threats to IoT Applications and Service Domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 103 publications
(40 citation statements)
references
References 6 publications
0
25
0
2
Order By: Relevance
“…For example, smart health deals with highly personalized data and requires high-level security and privacy protection [38]. Since many IoT applications may be owned by third-party service providers, cyberattacks on these applications may affect the security of other interrelated applications [39].…”
Section: Cybersecurity At the Application Layermentioning
confidence: 99%
“…For example, smart health deals with highly personalized data and requires high-level security and privacy protection [38]. Since many IoT applications may be owned by third-party service providers, cyberattacks on these applications may affect the security of other interrelated applications [39].…”
Section: Cybersecurity At the Application Layermentioning
confidence: 99%
“…Similarly, Frustaci et al [29] and Neshenko et al [52] presented a taxonomy of the IoT security issues based on the perception, transportation, and application. Tweneboah-Koduah et al [67] analyzed the taxonomy of various security issues, whereas Ge at al. [30] devised an IoT security model consisting of five phases (namely data processing, security model generation, security visualization, security analysis, and model updates).…”
Section: Related Workmentioning
confidence: 99%
“…The most complete classification of the IoT attack vectors is described in [13], referring to the IoT ecosystem as a Web3 or Web of Things phenomenon, where four main categories are provided: Device, Application Service, Network, Web Interface and Data integrity. Developing a cyber security solution targeting to protect all of the identified vectors is a very challenging and crucial task.…”
Section: Advancements In Iot Cyber Security Monitoringmentioning
confidence: 99%