Comprehensive Study of IoT Vulnerabilities and Countermeasures
This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational intelligence. IoT is widely used in numerous fields, including u...
Saved in:
| Main Authors: | Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-03-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/15/6/3036 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases
by: Anna Felkner, et al.
Published: (2024-11-01) -
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
by: Tinshu Sasi, et al.
Published: (2024-11-01) -
Hardware Development and Evaluation of Multihop Cluster-Based Agricultural IoT Based on Bluetooth Low-Energy and LoRa Communication Technologies
by: Emmanuel Effah, et al.
Published: (2024-09-01) -
Blockchain-IoT Healthcare Applications and Trends: A Review
by: Wafaa A. N. A. Al-Nbhany, et al.
Published: (2024-01-01) -
Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey
by: Abdullah Alfahaid, et al.
Published: (2025-05-01)