2019
DOI: 10.1109/comst.2019.2910750
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
345
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 627 publications
(347 citation statements)
references
References 159 publications
0
345
0
2
Order By: Relevance
“…Let C be the cipher text space consisting of symbols that are different from the one defined in M. The encryption mechanism is a bijective function, denoted by Ee, between M and C, which can be uniquely determined by an element {e ∈ K}, where K is the key space. Likewise, the decryption mechanism that can be defined as a Security in IoT is still a factor of concern and boundless applications of the IoT technology portend a wide range of security challenges [9,10]. Unauthorized access and data manipulation have become common threats in these networks.…”
Section: Security Preliminariesmentioning
confidence: 99%
“…Let C be the cipher text space consisting of symbols that are different from the one defined in M. The encryption mechanism is a bijective function, denoted by Ee, between M and C, which can be uniquely determined by an element {e ∈ K}, where K is the key space. Likewise, the decryption mechanism that can be defined as a Security in IoT is still a factor of concern and boundless applications of the IoT technology portend a wide range of security challenges [9,10]. Unauthorized access and data manipulation have become common threats in these networks.…”
Section: Security Preliminariesmentioning
confidence: 99%
“…We consider four data security dimensions: integrity, authenticity, confidentiality and privacy. For more details on the state‐of‐the‐art, we refer the reader to a number of excellent surveys presenting the state‐of‐the‐art in security in IoT …”
Section: State Of the Art/related Workmentioning
confidence: 99%
“…IoT security is a vast topic, including several aspects of the IoT architecture . Those range from protocol design to the analysis of vulnerabilities using compiler tools .…”
Section: Related Workmentioning
confidence: 99%