Cybersecurity Analysis of IoT Networks

被引:3
|
作者
Horalek, Josef [1 ]
Sobeslav, Vladimir [1 ]
机构
[1] Univ Hradec Kralove, Fac Informat & Management, Hradec Kralove, Czech Republic
关键词
CIA triad; Parkerian hexad; IoT; MQTT; IoTWF; OneM2M; IoT-A;
D O I
10.1007/978-3-030-28374-2_42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The goal of the article is to introduce the security risks connected with intelligent IoT networks and the recommendation of their elimination and the way to sustain them at an adequate level. Recommendations are related to general architecture of IoT for the risk management that presents one of many views for risk managements and their mitigation using standard and obligatory methods. These methods are practically tested within recommendations of general access for elimination of the cybernetic risks within IoT network solutions build on standard and generally accessible components.
引用
收藏
页码:488 / 499
页数:12
相关论文
共 50 条
  • [1] Quantum-enhanced cybersecurity analysis and medical image encryption in cloud IoT networks
    A Priyadarshini
    S P Abirami
    Mohammed Altaf Ahmed
    B Arunkumar
    [J]. Optical and Quantum Electronics, 56
  • [2] Quantum-enhanced cybersecurity analysis and medical image encryption in cloud IoT networks
    Priyadarshini, A.
    Abirami, S. P.
    Ahmed, Mohammed Altaf
    Arunkumar, B.
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (04)
  • [3] Cybersecurity Risk Analysis in the IoT: A Systematic Review
    Alsalem, Thanaa Saad
    Almaiah, Mohammed Amin
    Lutfi, Abdalwali
    Shin, Seokjoo
    [J]. ELECTRONICS, 2023, 12 (18)
  • [4] Analysis of Botnet Domain Names for IoT Cybersecurity
    Li, Wanting
    Jin, Jian
    Lee, Jong-Hyouk
    [J]. IEEE ACCESS, 2019, 7 : 94658 - 94665
  • [5] Analysis of Hypervisor Architectures for Improving Cybersecurity in IoT Environments
    Berbegal-Esteve, David
    Mora-Mora, Higinio
    Mora-Gimeno, Francisco J.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022), 2023, 594 : 401 - 412
  • [6] Towards IoT Cybersecurity Modeling: From Malware Analysis Data to IoT System Representation
    Rodriguez-Mota, A.
    Escamilla-Ambrosio, P. J.
    Happa, J.
    Nurse, J. R. C.
    [J]. 2016 8TH IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2016,
  • [7] Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks
    Becerra-Suarez, Fray L.
    Tuesta-Monteza, Victor A.
    Mejia-Cabrera, Heber I.
    Arcila-Diaz, Juan
    [J]. INFORMATICS-BASEL, 2024, 11 (02):
  • [8] Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection
    Sharma, Tripti
    Prasad, Sanjeev Kumar
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2237 - 2258
  • [9] Tides of Blockchain in IoT Cybersecurity
    Ahakonye, Love Allen Chijioke
    Nwakanma, Cosmas Ifeanyi
    Kim, Dong-Seong
    [J]. SENSORS, 2024, 24 (10)
  • [10] NIST Cybersecurity for IoT Program
    Megas, Katerina
    Cuthill, Barbara
    Fagan, Michael
    Watrobski, Paul
    Defranco, Joanna F.
    [J]. Computer, 2024, 57 (12) : 144 - 148