Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8468
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Alladi, Tejasvi | - |
dc.contributor.author | Chamola, Vinay | - |
dc.date.accessioned | 2023-01-12T09:13:15Z | - |
dc.date.available | 2023-01-12T09:13:15Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/8977812 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8468 | - |
dc.description.abstract | As consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, in this article, we describe the common attacks faced by consumer IoT devices and suggest potential mitigation strategies. We hope that the findings presented in this article will inform the future design of IoT devices. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Security risks | en_US |
dc.subject | Consumer IoT devices | en_US |
dc.subject | Mitigation strategies | en_US |
dc.subject | Consumer Internet of Things devices | en_US |
dc.title | Consumer IoT: Security Vulnerability Case Studies and Solutions | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.