Security Challenges and Approaches in Internet of ThingsVulnerable Features and Threats
Security Challenges and Approaches in Internet of Things: Vulnerable Features and Threats
Misra, Sridipta; Maheswaran, Muthucumaru; Hashmi, Salman
2016-09-04 00:00:00
[To ensure evolution of the IoT into a secure infrastructure, it is indispensable to exhaustively identify the features of the IoT, which could be exploited to pose threat to either the infrastructure or its stakeholders. This chapter presents an in-depth analysis of the vulnerability space of the IoT, and attempts to create specialized “threat spaces" by providing an exhaustive threat taxonomy. We identify a new genre of threats: Reflective Trust and Reputation Threats.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/security-challenges-and-approaches-in-internet-of-things-vulnerable-Q5nX1s8v8G
Security Challenges and Approaches in Internet of ThingsVulnerable Features and Threats
[To ensure evolution of the IoT into a secure infrastructure, it is indispensable to exhaustively identify the features of the IoT, which could be exploited to pose threat to either the infrastructure or its stakeholders. This chapter presents an in-depth analysis of the vulnerability space of the IoT, and attempts to create specialized “threat spaces" by providing an exhaustive threat taxonomy. We identify a new genre of threats: Reflective Trust and Reputation Threats.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.