2022
DOI: 10.14569/ijacsa.2022.0131145
|View full text |Cite
|
Sign up to set email alerts
|

Toward an Ontological Cyberattack Framework to Secure Smart Cities with Machine Learning Support

Abstract: With the emergence and the movement toward the Internet of Things (IoT), one of the most significant applications that have gained a great deal of concern is smart cities. In smart cities, IoT is leveraged to manage life and services within a minimal, or even no, human intervention. IoT paradigm has created opportunities for a wide variety of cyberattacks to threaten systems and users. Many challenges have been faced in order to encounter IoT cyberattacks, such as the diversity of attacks and the frequent appe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Nevertheless, two-factor authentication may inconvenience some people, who deem it complicated and troublesome. In line with Malkawi, Obaid [66], IoT enables the automation of multiple systems and services, including healthcare, homes, traffic lights, and electricity grids. Operating system and firmware updates could be another alternative to prevent IoT devices from becoming a victim of cyberattacks.…”
Section: H Countermeasurementioning
confidence: 98%
See 1 more Smart Citation
“…Nevertheless, two-factor authentication may inconvenience some people, who deem it complicated and troublesome. In line with Malkawi, Obaid [66], IoT enables the automation of multiple systems and services, including healthcare, homes, traffic lights, and electricity grids. Operating system and firmware updates could be another alternative to prevent IoT devices from becoming a victim of cyberattacks.…”
Section: H Countermeasurementioning
confidence: 98%
“…The use of IoT devices in various sectors further increases the need for penetration testing. Furthermore, identifying and characterizing security prerequisites, potential cyberattacks, and their implications on the system can significantly develop and select an optimal protection system [66]. Consequently, penetration testing proves pivotal in mitigating the impact and possible occurrence of attacks in the IoT context.…”
Section: The Need For Penetration Testingmentioning
confidence: 99%