Threats and Vulnerabilities of Wireless Networks in the Internet of Things (IoT)

被引:0
|
作者
机构
[1] Hussain, Khalid
[2] Rahmatyar, Adib Rahman
[3] Riskhan, Basheer
[4] Sheikh, Md Amin Ullah
[5] Sindiramutty, Siva Raja
来源
| 1600年 / Institute of Electrical and Electronics Engineers Inc.卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Conference article (CA)
引用
收藏
相关论文
共 50 条
  • [31] Study of Integration of Wireless Sensor Network and Internet of Things (IoT)
    Najim, Ali Hamzah
    Kurnaz, Sefer
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [32] Health IoT Threats: Survey of Risks and Vulnerabilities
    Madanian, Samaneh
    Chinbat, Tserendorj
    Subasinghage, Maduka
    Airehrour, David
    Hassandoust, Farkhondeh
    Yongchareon, Sira
    [J]. Future Internet, 2024, 16 (11):
  • [33] Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study
    Alanezi, Mohammed Ateeq
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (02): : 153 - 158
  • [34] Low Power Routing and Channel Allocation Method of Wireless Video Sensor Networks for Internet of Things (IoT)
    Kim, HyungWon
    [J]. 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 446 - 451
  • [35] Anatomy of Threats to the Internet of Things
    Makhdoom, Imran
    Abolhasan, Mehran
    Lipman, Justin
    Liu, Ren Ping
    Ni, Wei
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1636 - 1675
  • [36] Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks
    Yu, Heejung
    Zikria, Yousaf Bin
    [J]. SENSORS, 2020, 20 (18) : 1 - 6
  • [37] Internet of Things Vulnerabilities in Military Environments
    Toth, Andras
    [J]. VOJENSKE ROZHLEDY-CZECH MILITARY REVIEW, 2021, 30 (03): : 45 - 58
  • [38] IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats
    Nicho, Mathew
    Girija, Shini
    [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 123 - 129
  • [39] An Investigation of Vulnerabilities in Internet of Health Things
    Rahman, Saifur
    Suleski, Tance
    Ahmed, Mohiuddin
    Kayes, A. S. M.
    [J]. COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 296 - 306
  • [40] SysSec: Managing threats and Vulnerabilities in the future Internet
    Markatos, Evangelos
    Bos, Herbert
    [J]. ERCIM NEWS, 2012, (90): : 13 - 14