A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …
and biosensors those have assisted in the rapid development of implanting wearable …
Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …
care that led to an increased number of networked medical devices and medical telemetry …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
C-FLAT: control-flow attestation for embedded systems software
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
{SmartAuth}:{User-Centered} authorization for the internet of things
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
such as the ability to control a lock. Unfortunately, because few users act based upon, or …
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
Security architectures providing Trusted Execution Environments (TEEs) have been an
appealing research subject for a wide range of computer systems, from low-end embedded …
appealing research subject for a wide range of computer systems, from low-end embedded …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
Security and privacy challenges in industrial internet of things
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …
applications, from industrial control systems, modern vehicles, to critical infrastructure …
Security vulnerabilities of internet of things: A case study of the smart plug system
With the rapid development of the Internet of Things, more and more small devices are
connected into the Internet for monitoring and control purposes. One such type of devices …
connected into the Internet for monitoring and control purposes. One such type of devices …
Seda: Scalable embedded device attestation
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …
services for energy grids, industrial control systems, gas and oil search robots, home/office …