2019
DOI: 10.1007/s10207-019-00445-y
|View full text |Cite
|
Sign up to set email alerts
|

The IoT security gap: a look down into the valley between threat models and their implementation

Abstract: We claim to have identified gaps between threat modeling frameworks, threat model use in IoT security research and attacks that may be missed by current research. While security research includes sections known as 'threat models', these models are not supported by the categorization and standardization that threat modeling frameworks would have to offer. Then again, if existing threat modeling frameworks were used, they would still allow many vulnerabilities to pass through undetected, since they are meant for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(19 citation statements)
references
References 41 publications
0
18
0
Order By: Relevance
“…In 2018, Bakhshi et al surveyed numerous publications referencing differing reference models and focused mainly on data ingestion and abstraction [15]. Peter Aufner reviews various threat frameworks in light of the Cisco model and concludes that gaps exist between the frameworks, IoT and security research [16].…”
Section: The Cisco Seven-layer Iot Reference Modelmentioning
confidence: 99%
“…In 2018, Bakhshi et al surveyed numerous publications referencing differing reference models and focused mainly on data ingestion and abstraction [15]. Peter Aufner reviews various threat frameworks in light of the Cisco model and concludes that gaps exist between the frameworks, IoT and security research [16].…”
Section: The Cisco Seven-layer Iot Reference Modelmentioning
confidence: 99%
“…Besides, the author also highlighted mitigation strategies against security attacks in Pervasive and Mobile Computing. Sybil, DoS, Hello and Sinkhole are layered network attacks in WSN that are still relevant in IoT environments ( Aufner, 2019 ). Thus, it is applicable to any IoT devices which uses the communication layer to communicate.…”
Section: Survey Methodologymentioning
confidence: 99%
“…For another, investigating a single device over an assembled system allows for vulnerabilities to pass through undetected (J. R. C. Nurse, Creese, & Roure, 2017). While we accept that one must account for the entire IoT "ecosystem" (Aufner, 2020;Omotosho et al, 2019;Seeam, Ogbeh, Guness, & Bellekens, 2019), a broader investigation is beyond the scope of this chapter.…”
Section: Threat Modeling a Smart Internet-connected Lockmentioning
confidence: 99%