2020
DOI: 10.1109/access.2020.3022842
|View full text |Cite
|
Sign up to set email alerts
|

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Abstract: Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
46
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 100 publications
(47 citation statements)
references
References 166 publications
0
46
0
1
Order By: Relevance
“…[ 8 , 9 , 10 , 11 ]. The authors relate these concerns to the IIoT/I4.0 domain and highlight how these unresolved issues [ 12 , 13 ] leave the industrial environment susceptible to security breaches.…”
Section: Cybersecurity Challenges In Iiotmentioning
confidence: 99%
“…[ 8 , 9 , 10 , 11 ]. The authors relate these concerns to the IIoT/I4.0 domain and highlight how these unresolved issues [ 12 , 13 ] leave the industrial environment susceptible to security breaches.…”
Section: Cybersecurity Challenges In Iiotmentioning
confidence: 99%
“…Colakovic et al [ 4 ] detailed the vision towards IoT along with various technologies used at different levels. Moreover, the survey conducted in [ 1 , 5 ] also introduces these technologies.…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…DoS attack: In this attack, the intruder pretends to be an authenticated user to disrupt the normal functioning of the network. It is accomplished by flooding the authenticated user to trigger a crash [ 5 ].…”
Section: Background and Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…QoS levels increase the reliability but the energy consumption and the bandwidth also increases as well. Both CoAP and MQTT is based on the IEEE 802.11 mesh network 74 . CoAP is operated over UDP and MQTT runs over TCP.…”
Section: Introductionmentioning
confidence: 99%