2017
DOI: 10.1016/j.simpat.2016.09.007
|View full text |Cite
|
Sign up to set email alerts
|

Using virtual environments for the assessment of cybersecurity issues in IoT scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…Some studies consider vulnerabilities stemming from the integration of IoT devices with the IVA device [26], [27]. Such integration typically surrounds smart home devices (e.g., Nest, or Ecobee 4), smart security devices (e.g., Scout, or Abode), smart lighting devices (e.g., Philip Hue, or LIFX), household appliances (e.g., GE+ Geneva), and surveillance cameras (e.g., Cloud Cam, Netgear Arlo Q).…”
Section: Integration Of Iot Devicesmentioning
confidence: 99%
See 3 more Smart Citations
“…Some studies consider vulnerabilities stemming from the integration of IoT devices with the IVA device [26], [27]. Such integration typically surrounds smart home devices (e.g., Nest, or Ecobee 4), smart security devices (e.g., Scout, or Abode), smart lighting devices (e.g., Philip Hue, or LIFX), household appliances (e.g., GE+ Geneva), and surveillance cameras (e.g., Cloud Cam, Netgear Arlo Q).…”
Section: Integration Of Iot Devicesmentioning
confidence: 99%
“…A study by Furfaro et. al [27] presented three IoT scenarios in order to investigate vulnerabilities of smart objects. The scenarios were created using SmallWorld which is a software platform that has been arranged to support the assessment, teaching, and learning of security related issues in numerous domains.…”
Section: Integration Of Iot Devicesmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper describes an approach based on the exploitation of virtual environments and agent-based simulation for the evaluation of cybersecurity solutions for the next generation of IoT applications in realistic scenarios. The effectiveness of the approach is shown by considering a concrete case study involving the cooperation of real and virtual smart devices inside a virtualized scenario where security issues are first evaluated and then handled [22]. We look into the Smart Parking application domain and provide a solution that protects the privacy of the users by totally avoiding the exchange of confidential information [23].…”
Section: Introductionmentioning
confidence: 99%