DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8468
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlladi, Tejasvi-
dc.contributor.authorChamola, Vinay-
dc.date.accessioned2023-01-12T09:13:15Z-
dc.date.available2023-01-12T09:13:15Z-
dc.date.issued2020-
dc.identifier.urihttps://ieeexplore.ieee.org/document/8977812-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8468-
dc.description.abstractAs consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, in this article, we describe the common attacks faced by consumer IoT devices and suggest potential mitigation strategies. We hope that the findings presented in this article will inform the future design of IoT devices.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity risksen_US
dc.subjectConsumer IoT devicesen_US
dc.subjectMitigation strategiesen_US
dc.subjectConsumer Internet of Things devicesen_US
dc.titleConsumer IoT: Security Vulnerability Case Studies and Solutionsen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.