Consumer IoT: Security Vulnerability Case Studies and Solutions.
Tejasvi AlladiVinay ChamolaBiplab SikdarKim-Kwang Raymond ChooPublished in: IEEE Consumer Electron. Mag. (2020)
Keyphrases
- case study
- buffer overflow
- security problems
- information security
- security requirements
- intrusion detection
- risk assessment
- security vulnerabilities
- lessons learned
- optimal solution
- key management
- security analysis
- open source
- network security
- security patterns
- security issues
- access control
- knowledge management
- management system
- real world
- rfid systems
- ubiquitous computing
- security mechanisms
- statistical databases
- computer networks
- cloud computing
- wireless sensor networks