Firmware Update Attacks and Security for IoT Devices: Survey.
Meriem BettayebQassim NasirManar AbuTalibPublished in: ArabWIC (2019)
Keyphrases
- security problems
- security mechanisms
- security threats
- security issues
- security protocols
- computer networks
- computer security
- security requirements
- key management
- java card
- cyber attacks
- operating system
- security vulnerabilities
- security measures
- countermeasures
- denial of service attacks
- security breaches
- access control
- stream cipher
- mobile devices
- computer systems
- chosen plaintext
- data security
- malicious attacks
- malicious users
- fault injection
- buffer overflow
- security risks
- security flaws
- security policies
- information security
- intrusion detection and prevention
- secure routing
- power consumption
- biometric template
- smart objects
- ddos attacks
- security analysis
- resource constrained
- cloud computing
- intrusion detection
- rfid systems
- ad hoc networks
- anomaly detection
- big data
- watermarking algorithm
- cryptographic protocols
- management system