Your browser doesn't support javascript.
IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats
20th International Conference on Ubiquitous Computing and Communications, 20th International Conference on Computer and Information Technology, 4th International Conference on Data Science and Computational Intelligence and 11th International Conference on Smart Computing, Networking, and Services, IUCC/CIT/DSCI/SmartCNS 2021 ; : 123-129, 2021.
Article in English | Scopus | ID: covidwho-1788747
ABSTRACT
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution, has enabled cyber-physical digital transformation strategies and accelerated business automation. In a Covid-19 related Harvard Business Review study, 95 per cent of executives agreed that digital transformation strategies had become increasingly important. This highlights the critical importance of being prepared for IoT vulnerabilities and attacks. Mapping IoT devices to identify their vulnerabilities and attack allows academics and practitioners to identify, analyze, and mitigate IoT-related concerns. In this paper, we categorize IoT sensors, their IoT related vulnerabilities, and the IoT attacks that affect them and propose a model that maps the relationships among them. Our model provides valuable insights into IoT attack vectors and associated vulnerabilities with consumer IoT devices. © 2021 IEEE.
Keywords

Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: CIT Year: 2021 Document Type: Article

Similar

MEDLINE

...
LILACS

LIS


Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: CIT Year: 2021 Document Type: Article