Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets
-
Published:2022-01-01
Issue:1
Volume:13
Page:84-98
-
ISSN:2081-4836
-
Container-title:Paladyn, Journal of Behavioral Robotics
-
language:en
-
Short-container-title:
Author:
Sharma Abhinav1, Gupta Anand Kumar1, Shabaz Mohammad1
Affiliation:
1. Model Institute of Engineering and Technology , Jammu , J&K , India
Abstract
AbstractInternet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.
Publisher
Walter de Gruyter GmbH
Subject
Behavioral Neuroscience,Artificial Intelligence,Cognitive Neuroscience,Developmental Neuroscience,Human-Computer Interaction
Reference43 articles.
1. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010. 2. S. Andreev, S. Balandin, and Y. Koucheryavy, Eds., “Internet of Things, smart spaces, and next generation networking,” 12th International Conference, NEW2AN 2012, and 5th Conference, ruSMART 2012, St. Petersburg, Russia, August 27–29, 2012. Proceedings, Berlin, Heidelberg, Springer Berlin Heidelberg, 2012. 3. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, et al., “Internet of Things strategic research roadmap,” Internet Things-global Technol. Societal Trends, vol. 1, no. 2011, pp. 9–52, 2011 Jun. 4. B. Schneier, Secrets and Lies: Digital Security in a Networked World, Indianapolis, Indiana, Wiley Publishing, Inc, 2015. 5. C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security and trust research in M2M system,” Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety, 2011.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|