A Review of the Weaponization of IoT: Security Threats and Countermeasures.
Marek KulbackiZenon ChaczkoSophie BartonPeter Wajs-ChaczkoJan NikodemJerzy W. RozenblitRyszard KlempousAtsushi ItoMichal KulbackiPublished in: SACI (2024)
Keyphrases
- countermeasures
- security threats
- information security
- security issues
- security measures
- key management
- security mechanisms
- sensitive data
- security risks
- management system
- smart card
- power analysis
- network security
- information systems
- resource constrained
- wireless sensor networks
- secret key
- intrusion detection
- computer security
- cloud computing
- data mining