Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
Christos XenofontosIoannis ZografopoulosCharalambos KonstantinouAlireza JolfaeiMuhammad Khurram KhanKim-Kwang Raymond ChooPublished in: IEEE Internet Things J. (2022)
Keyphrases
- case study
- cyber attacks
- security measures
- security problems
- critical infrastructure
- key management
- security vulnerabilities
- information security
- denial of service attacks
- key exchange protocol
- countermeasures
- malicious users
- network security
- attack scenarios
- fault injection
- authentication protocol
- authentication mechanism
- lessons learned
- encryption algorithm
- security issues
- access control
- cyber security
- dos attacks
- security requirements
- security management
- intrusion detection
- security mechanisms
- secret key
- malicious attacks
- information leakage
- buffer overflow
- open source
- management system
- forensic analysis
- key agreement
- security threats
- computer networks
- real world
- data security
- statistical databases
- cloud computing
- electronic commerce
- malicious activities
- java card
- security analysis
- commercial systems
- security risks
- security properties
- attack detection
- computer security
- sensitive data
- security protocols
- security policies
- location information
- industrial applications
- penetration testing