Kuismanen, 2022 - Google Patents
Security in home IoT environmentsKuismanen, 2022
View PDF- Document ID
- 10051319145039783528
- Author
- Kuismanen A
- Publication year
External Links
Snippet
This thesis investigates the overall security of home IoT environments and how to remediate most of the common security issues in IoT environments. The assumption is made that most IoT environments are poorly or lazily configured when it comes to security. The methods …
- 238000000034 method 0 abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shafiq et al. | The rise of “Internet of Things”: review and open research issues related to detection and prevention of IoT‐based security attacks | |
| Mallik | Man-in-the-middle-attack: Understanding in simple words | |
| Abdul-Ghani et al. | A comprehensive IoT attacks survey based on a building-blocked reference model | |
| JP2018525935A (en) | Secure communication using devices that can connect to the Internet | |
| Laghari et al. | Securing MQTT ecosystem: Exploring vulnerabilities, mitigations, and future trajectories | |
| Sattar et al. | A stride threat model for 5g core slicing | |
| Cecílio et al. | Security issues in industrial Internet-of-Things: Threats, attacks and solutions | |
| Khalid et al. | Study of security and privacy issues in internet of things | |
| Patel et al. | Security issues, attacks and countermeasures in layered IoT ecosystem | |
| Karnatak et al. | A secure signature‐based access control and key management scheme for fog computing‐based IoT‐enabled big data applications | |
| Ghering et al. | Evil twin vulnerabilities in wi-fi networks | |
| Baskaran et al. | Internet of things security | |
| Joseph | Analysis on iot networks security: Threats, risks, esp8266 based penetration testing device and defense framework for iot infrastructure | |
| Kuismanen | Security in home IoT environments | |
| Gao et al. | SecT: A lightweight secure thing-centered IoT communication system | |
| Abo-Soliman et al. | Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments | |
| Almjamai | A comprehensive taxonomy of attacks and mitigations in IoT Wi-Fi networks: physical and data-link layer | |
| Tasnim et al. | Analyzing Threats in Public Wi-Fi: A Study of Attack Vectors, Vulnerability and User Awareness | |
| Agrawal et al. | iTieProbe: How Vulnerable Your IoT Provisioning via Wi-Fi AP Mode or EZ Mode? | |
| Ghanim et al. | Evaluating the effectiveness of WPA3 protocol against advanced hacking attacks | |
| Susheel et al. | Knocking out security risks of smart video doorbell cameras | |
| Achkoudir et al. | Ethical Hacking of a Smart Plug | |
| Juma Ayuma et al. | A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices. | |
| Ayuma et al. | A survey on token transmission attacks, effects, and mitigation strategies in IoT devices | |
| De Bique | The botnet threat against smart refrigerator security |