Skip to content
Back to outputs

IoT security frameworks

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

Standard

IoT security frameworks. / Bendiab, Gueltoum; Saridou, Betty; Barlow, Luke; Savage, Nick; Shiaeles, Stavros.

Internet of Things, Threats, Landscape, and Countermeasures. ed. / Stavros Shiaeles; Nicholas Kolokotronis. CRC Press Inc, 2021. p. 239-290.

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

Harvard

Bendiab, G, Saridou, B, Barlow, L, Savage, N & Shiaeles, S 2021, IoT security frameworks. in S Shiaeles & N Kolokotronis (eds), Internet of Things, Threats, Landscape, and Countermeasures. CRC Press Inc, pp. 239-290. <https://www.routledge.com/Internet-of-Things-Threats-Landscape-and-Countermeasures/Shiaeles-Kolokotronis/p/book/9780367433321>

APA

Bendiab, G., Saridou, B., Barlow, L., Savage, N., & Shiaeles, S. (2021). IoT security frameworks. In S. Shiaeles, & N. Kolokotronis (Eds.), Internet of Things, Threats, Landscape, and Countermeasures (pp. 239-290). CRC Press Inc. https://www.routledge.com/Internet-of-Things-Threats-Landscape-and-Countermeasures/Shiaeles-Kolokotronis/p/book/9780367433321

Vancouver

Bendiab G, Saridou B, Barlow L, Savage N, Shiaeles S. IoT security frameworks. In Shiaeles S, Kolokotronis N, editors, Internet of Things, Threats, Landscape, and Countermeasures. CRC Press Inc. 2021. p. 239-290

Author

Bendiab, Gueltoum ; Saridou, Betty ; Barlow, Luke ; Savage, Nick ; Shiaeles, Stavros. / IoT security frameworks. Internet of Things, Threats, Landscape, and Countermeasures. editor / Stavros Shiaeles ; Nicholas Kolokotronis. CRC Press Inc, 2021. pp. 239-290

Bibtex

@inbook{1081a49854484153aa6509774bb0947e,
title = "IoT security frameworks",
abstract = "Internet of Things (IoT) devices are quickly changing the way people access services and utilize internet infrastructure. They are in every part of our daily lives, whether at work or home, we are constantly connected. With this ever-evolving connection, users can find themselves at risk from a variety of both malicious and accidental threats [1]. In fact, cyber-threats may affect the functioning of modern society by causing electrical blackouts [2], disrupting the normal functionality of IoT devices and computer networks, and making them unavailable for legitimate users, and causing large theft of valuable sensitive information like financial credentials and medical records [2]. They can even cause failure of medical and military equipment and breaches of national security secrets. The latest threat landscape shows that cybercriminals have improved their tactics to the point where they become extremely difficult to detect and remediate. They are now successfully attacking computers/devices and networks every 39 seconds, according to a recent study by the University of Maryland1.It is evident that cyber-threats are seen as one of the top challenges facing IoT devices and edge-computing frameworks. The information security community warned that even a single unsecured device connected to a network could cause a potential threat to the whole network and serves as a point of entry for a wide variety of hacking attempts [3]. Another worrying trend is the continuing improvement of the advanced persistent threats (APTs), which present a very real and urgent menace to businesses and IoT systems. Unlike other hacking techniques, APTs attacks are targeting …",
author = "Gueltoum Bendiab and Betty Saridou and Luke Barlow and Nick Savage and Stavros Shiaeles",
year = "2021",
month = apr,
day = "29",
language = "English",
isbn = "9780367433321",
pages = "239--290",
editor = "Stavros Shiaeles and Nicholas Kolokotronis",
booktitle = "Internet of Things, Threats, Landscape, and Countermeasures",
publisher = "CRC Press Inc",

}

RIS

TY - CHAP

T1 - IoT security frameworks

AU - Bendiab, Gueltoum

AU - Saridou, Betty

AU - Barlow, Luke

AU - Savage, Nick

AU - Shiaeles, Stavros

PY - 2021/4/29

Y1 - 2021/4/29

N2 - Internet of Things (IoT) devices are quickly changing the way people access services and utilize internet infrastructure. They are in every part of our daily lives, whether at work or home, we are constantly connected. With this ever-evolving connection, users can find themselves at risk from a variety of both malicious and accidental threats [1]. In fact, cyber-threats may affect the functioning of modern society by causing electrical blackouts [2], disrupting the normal functionality of IoT devices and computer networks, and making them unavailable for legitimate users, and causing large theft of valuable sensitive information like financial credentials and medical records [2]. They can even cause failure of medical and military equipment and breaches of national security secrets. The latest threat landscape shows that cybercriminals have improved their tactics to the point where they become extremely difficult to detect and remediate. They are now successfully attacking computers/devices and networks every 39 seconds, according to a recent study by the University of Maryland1.It is evident that cyber-threats are seen as one of the top challenges facing IoT devices and edge-computing frameworks. The information security community warned that even a single unsecured device connected to a network could cause a potential threat to the whole network and serves as a point of entry for a wide variety of hacking attempts [3]. Another worrying trend is the continuing improvement of the advanced persistent threats (APTs), which present a very real and urgent menace to businesses and IoT systems. Unlike other hacking techniques, APTs attacks are targeting …

AB - Internet of Things (IoT) devices are quickly changing the way people access services and utilize internet infrastructure. They are in every part of our daily lives, whether at work or home, we are constantly connected. With this ever-evolving connection, users can find themselves at risk from a variety of both malicious and accidental threats [1]. In fact, cyber-threats may affect the functioning of modern society by causing electrical blackouts [2], disrupting the normal functionality of IoT devices and computer networks, and making them unavailable for legitimate users, and causing large theft of valuable sensitive information like financial credentials and medical records [2]. They can even cause failure of medical and military equipment and breaches of national security secrets. The latest threat landscape shows that cybercriminals have improved their tactics to the point where they become extremely difficult to detect and remediate. They are now successfully attacking computers/devices and networks every 39 seconds, according to a recent study by the University of Maryland1.It is evident that cyber-threats are seen as one of the top challenges facing IoT devices and edge-computing frameworks. The information security community warned that even a single unsecured device connected to a network could cause a potential threat to the whole network and serves as a point of entry for a wide variety of hacking attempts [3]. Another worrying trend is the continuing improvement of the advanced persistent threats (APTs), which present a very real and urgent menace to businesses and IoT systems. Unlike other hacking techniques, APTs attacks are targeting …

M3 - Chapter (peer-reviewed)

SN - 9780367433321

SP - 239

EP - 290

BT - Internet of Things, Threats, Landscape, and Countermeasures

A2 - Shiaeles, Stavros

A2 - Kolokotronis, Nicholas

PB - CRC Press Inc

ER -

ID: 26775145