A Comprehensive Study of Security of Internet-of-Things
Citations
1,008 citations
Cites background from "A Comprehensive Study of Security o..."
...Reactions: Following from a long history of conventional countermeasures against network threats in cyberphysical systems [106], [107], [109], there are ongoing efforts to assess and prevent cyber-attacks in edge computing environments [116]....
[...]
800 citations
Cites background from "A Comprehensive Study of Security o..."
...A lot of private information can be inferred from this data, and that can be another cause of threat for an individual and society at large [7]....
[...]
...Authors of [7] have discussed vulnerabilities faced by IoT in brief....
[...]
476 citations
451 citations
Cites methods from "A Comprehensive Study of Security o..."
...Further, Mosenia and Jha [34] used the Cisco seven-level reference model [41] to present various corresponding attack scenarios....
[...]
415 citations
Cites background from "A Comprehensive Study of Security o..."
...Fremantle and Scott [17] and Mosenia and Jha [23] presented an in-depth analysis of all these aspects, where they discuss some of the major vulnerabilities presented above, proposing solutions at different layers, from the device side...
[...]
References
[...]
16,118 citations
12,539 citations
"A Comprehensive Study of Security o..." refers background in this paper
...The five-level model [2] is an alternative that has been proposed to facilitate interactions among different sections of an...
[...]
...where the term entity refers to a human, sensor, or potentially anything that may request/provide a service [2]....
[...]
...enterprise by decomposing complex systems into simplified applications consisting of an ecosystem of simpler and welldefined components [2]....
[...]
9,593 citations
[...]
4,816 citations
"A Comprehensive Study of Security o..." refers background in this paper
...5) Sybil: In a Sybil attack, the attacker adds/uses Sybil nodes, which are nodes with fake identities....
[...]
...Sybil nodes can out-vote honest nodes in the system....
[...]
..., Black Hole [67], [68], Gray Hole [68], Worm Hole [69], Hello Flood [70], [71], and Sybil [72]....
[...]
...In addition to altering attacks, several other serious attacks have been proposed, e.g., Black Hole [67], [68], Gray Hole [68], Worm Hole [69], Hello Flood [70], [71], and Sybil [72]....
[...]
3,444 citations
"A Comprehensive Study of Security o..." refers methods in this paper
...Several encryption methods have been proposed to address security issues in communication [136], [137]....
[...]