IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats
20th International Conference on Ubiquitous Computing and Communications, 20th International Conference on Computer and Information Technology, 4th International Conference on Data Science and Computational Intelligence and 11th International Conference on Smart Computing, Networking, and Services, IUCC/CIT/DSCI/SmartCNS 2021
; : 123-129, 2021.
Article
in English
| Scopus | ID: covidwho-1788747
ABSTRACT
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution, has enabled cyber-physical digital transformation strategies and accelerated business automation. In a Covid-19 related Harvard Business Review study, 95 per cent of executives agreed that digital transformation strategies had become increasingly important. This highlights the critical importance of being prepared for IoT vulnerabilities and attacks. Mapping IoT devices to identify their vulnerabilities and attack allows academics and practitioners to identify, analyze, and mitigate IoT-related concerns. In this paper, we categorize IoT sensors, their IoT related vulnerabilities, and the IoT attacks that affect them and propose a model that maps the relationships among them. Our model provides valuable insights into IoT attack vectors and associated vulnerabilities with consumer IoT devices. © 2021 IEEE.
Full text:
Available
Collection:
Databases of international organizations
Database:
Scopus
Language:
English
Journal:
CIT
Year:
2021
Document Type:
Article
Similar
MEDLINE
...
LILACS
LIS