Living in the Internet of Things (IoT 2019) 2019
DOI: 10.1049/cp.2019.0158
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT

Abstract: The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…It was shown in [45] that it is becoming growingly difficult for users to locate used IoT devices and comprehend their goals and potentials due to the rise in smooth combination of IoT sensing and activating devices. [45] Providing a mechanism of mapping the IoT and tackling stakeholder needs is one method. IoT maps may, nonetheless, divulge a number of vulnerabilities that will require to be solve.…”
Section: The Critical Problem Of Emerging Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…It was shown in [45] that it is becoming growingly difficult for users to locate used IoT devices and comprehend their goals and potentials due to the rise in smooth combination of IoT sensing and activating devices. [45] Providing a mechanism of mapping the IoT and tackling stakeholder needs is one method. IoT maps may, nonetheless, divulge a number of vulnerabilities that will require to be solve.…”
Section: The Critical Problem Of Emerging Threatsmentioning
confidence: 99%
“…The STRIDE model was used for two case studies to find possible weaknesses and approaches for addressing them in the IoT maps setting. [45].…”
Section: The Critical Problem Of Emerging Threatsmentioning
confidence: 99%