2019 IEEE CyberPELS (CyberPELS) 2019
DOI: 10.1109/cyberpels.2019.8925210
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Vulnerabilities on Smart Grid End Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Vulnerabilities in IoTHD design and implementation pose immediate data-based threats. These threats include mass data leaks, IoT 2023, 4 improper forwarding of data, and sometimes even indirectly disrupting the operation of other connected devices through a lack of communication or coordination [15][16][17]. We found vulnerabilities in production-scale and patched devices that have stored data in unencrypted, non-proprietary, and easy-to-access formats.…”
Section: Introductionmentioning
confidence: 98%
See 2 more Smart Citations
“…Vulnerabilities in IoTHD design and implementation pose immediate data-based threats. These threats include mass data leaks, IoT 2023, 4 improper forwarding of data, and sometimes even indirectly disrupting the operation of other connected devices through a lack of communication or coordination [15][16][17]. We found vulnerabilities in production-scale and patched devices that have stored data in unencrypted, non-proprietary, and easy-to-access formats.…”
Section: Introductionmentioning
confidence: 98%
“…However, it is worth noting that proprietary formats can frustrate open-source efforts and are usually financially motivated but more secure. Alternatively, some vulnerabilities leak access to other connected devices, which is problematic for any roll-out [17]. Relating to attacks, an increasing amount of health and manufacturing infrastructure has been open [17,18] and subject to attacks, such as Advanced Persistent Threats (APTs), ransomware, trojans, worms, and loggers [19].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, there is no standardized protection for this type of IoT device. These elements are susceptible to various attacks, primarily linked to the communication mechanisms, authentication and authorization issues, and the insecurity of their software or firmware [56,57]:…”
mentioning
confidence: 99%