We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.doi:10.2352/ISSN.2470-1173.2021.3.MOBMU-096Daniel KantAndreas JohannsenReiner Creutzburg...
End-node system-on-chip (SoC) device operation can be summarized in four main functional areas: Sensing, from environmental sensing, for example temperature, humidity, chemical composition, which requires very low sample rates of one sample per minute or second(s), to motion, audio, voice, and...
Nonetheless, we can also observe more granularity in the topics. The zero trust research landscape can be effectively summarized into five clusters: Cluster 1 (red) is characterized by central nodes such as“internet of things”, “zero trust architecture”, “5 G and beyond”, and “machine ...
The communication between internetworks is also subject to cybersecurity risks. Because of this, innovative methods are crucial for timely intrusion detection and attack prevention measures. Recently, Machine Learning (ML) and Deep Learning (DL) algorithms have been used for network abnormality ...
Our contributions are summarized as follows: 1. We propose a smart contract-based fine-grained access control scheme that eliminates the need for a trusted third party to make authorization decisions. This approach provides granular control over data access during its validity period. 2. We pr...
There are several standards, best practices, and methodologies, such as ISA/IEC 62443, Cyber PHA, NIST, etc. that provide guidance on conducting cybersecurity risk assessments for IACSs. Most of them are generally in agreement with one another about the key points, so we have summarized the ...
This comprehensive scoring mechanism is visualized in Figure 7, with detailed mathematical symbols summarized in Table 3. Figure 7. The UTCID Personalized Privacy Assistant calculates the privacy risk resulting from specific identity attributes collected by IoT devices or apps by leveraging the breach ...
The performance, methodology, and year of publication of a few recent research on blockchain-based IDS for IoT are summarized in Table 3. The surge in cybersecurity attacks presents a significant challenge for protecting IoT networks due to their inherent vulnerabilities and resource constraints. ...
The conclusions drawn could be summarized as follows: Security: Security is the main enabler of IoT, and although DNS security is enhanced, it remains too costly for constrained IoT devices. Mobility: An IoT naming service should support mobility and automatic name update. DNS is ready to ...
E. Gaabouri [12] addressed the security challenges and threats of systems based on RFID and NFC technologies. It is suggested that the deployment of a strong cryptography scheme is a feasible solution to reinforce RFID’s communication security. The review also summarized the most recent studies...