Cite

[1] R. Shahan: Azure Internet of Things: Internet of Things (IoT) security architecture, Microsoft Azure, 2018, Available at: https://docs.microsoft.com/enus/azure/iot-fundamentals/iot-security-architecture Search in Google Scholar

[2] R. Sobers: 110 Must-Know Cybersecurity Statistics for 2020, Inside Out Security Blog, 2020, Available at: https://www.varonis.com/blog/cybersecurity-statistics/ Search in Google Scholar

[3] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732 Search in Google Scholar

[4] J.D. Meier, A. Mackman, B. Wastell: Threat Modeling Web Applications, Microsoft Corporation, 2005, Available at: https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff648006(v=pandp.10)?re-directedfrom=MSDN Search in Google Scholar

[5] D. Mocrri, Y. Chen, P. Musilek: IoT-based Smart Homes: A Review of System Architecture, Software, Communications, Privacy and Security. Internet of Things 1-2: pp. 81-98, 2018 Search in Google Scholar

[6] E. Cero, J. Baraković Husić, S. Baraković: IoT’s tiny steps towards 5G: Telco’s Perspective, Symmetry, vol. 9, no. 10, pp. 213, 201710.3390/sym9100213 Search in Google Scholar

[7] Technopedia: Internet of Things (IoT), 2019, Available at: https://www.techopedia.com/definition/28247/internet-of-things-iot Search in Google Scholar

[8] P. Stokes, 4 stages of IoT architecture, Data Driven Investor, 2018, Available at: https://medium.com/datadriveninvestor/4-stages-of-iot-architecture-explained-in-simple-words-b2ea8b4f777f Search in Google Scholar

[9] F. Allhoff, A. Henschke: The Internet of Things: Foundational Ethical Issues. Internet of Things 1-2 (2018): pp. 55-66, 2018 Search in Google Scholar

[10] N.K. Tran, Q.Z. Sheng, M.A. Babar, L. Yao: Searching The Web of Things: State of the Art, Challenges, and Solutions, ACM Computer Survey 50, 4, 201710.1145/3092695 Search in Google Scholar

[11] S. Duquennoy, G. Grimaud, J.J. Vandewalle: The Web of Things: Interconnecting Devices with High Usability and Performance, International Conference on Embedded Software and Systems, 2009. Available at: https://ieeexplore.ieee.org/abstract/document/506666410.1109/ICESS.2009.13 Search in Google Scholar

[12] M. Kovatsch, R. Matsukura, M. Lagally, T. Kawaguchi, K. Toumura, K. Kajimoto: WoT architecture, W3C, 2020, Available at: https://www.w3.org/TR/wot-architecture/ Search in Google Scholar

[13] S. Satapathy: Threat Modeling in Web Applications, Department of Computer Science and Engineering, India, 2014 Search in Google Scholar

[14] Y.H. Hwang: IoT Security & Privacy: Threats and Challenges, Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, Singapore, 201510.1145/2732209.2732216 Search in Google Scholar

[15] Abomhara, et al.: Security and privacy in the Internet of Things: Current status and open issues, Proceedings of International Conference on Privacy and Security in Mobile Systems, Aalborg, Denmark, 201410.1109/PRISMS.2014.6970594 Search in Google Scholar

[16] C. Atac, S. Akleylek: A Survey on Security Threats and Solutions in the Age of IoT, European Journal of Science and Technology, 2019, Available at: https://dergipark.org.tr/tr/download/article-file/661535 Search in Google Scholar

[17] M. Silaghi, A. Maraj, T. Atkinson: The Device War – The War Between IOT Brands In A Household, Florida Institute of Tehnology, 2018, Available at: https://www.researchgate.net/publication/330035067_The_Device_War_-_The_War_Between_IOT_Brands_In_A_Household Search in Google Scholar

[18] M. Frustaci, P. Pasquale, G. Aloi, G. Fortino: Evaluating critical security issues of the IoT world: Present and Future challenges, IEEE Internet of Things Journal, vol. 5, no. 4, 2017, Available at: https://www.researchgate.net/publication/320680302_Evaluating_critical_security_issues_of_the_IoT_world_Present_and_Future_challenges10.1109/JIOT.2017.2767291 Search in Google Scholar

[19] K. Tabassum, A. Ibrahim, S. A. El Rahman: Security Issues and Challenges in IoT, Proceedings of the International Conference on Computer and Information Sciences (ICCIS), 2019, Available at: https://www.researchgate.net/publication/333158390_Security_Issues_and_Challenges_in_IoT10.1109/ICCISci.2019.8716460 Search in Google Scholar

[20] A. Mawgoud, N. E. M. Khalifa, M. H. N. Taha: Security Threats of Social Internet of Things in the Higher Education Environment, Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications, 2020, Available at: https://www.researchgate.net/publication/334655853_Security_Threats_of_Social_Internet_of_Things_in_the_Higher_Education_Environment10.1007/978-3-030-24513-9_9 Search in Google Scholar

[21] D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac: Internet of things: Vision, applications and research challenges, Ad Hoc Networks, 2012, Available at: https://www.sciencedirect.com/science/article/abs/pii/S157087051200067410.1016/j.adhoc.2012.02.016 Search in Google Scholar

[22] The Cyber Security Challenges in the IoT Era, European Commission, 2019, Available at: https://cordis.europa.eu/event/id/147582-the-cyber-security-challenges-in-the-iot-era Search in Google Scholar

[23] E. Reshetova, M. McCool: Web of Things (WoT) Security and Privacy Guidelines, W3C, 2019, Available at: https://www.w3.org/TR/wot-security/ Search in Google Scholar

[24] J.D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, A. Murukan: Improving Web Application Security: Threats and Countermeasures, Microsoft Corporation, 2003, Available at: https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff648644(v=pandp.10) Search in Google Scholar

[25] A. Shostack: Threat Modeling: Designing for Security. John Wiley & Sons, Inc., 2014 Search in Google Scholar

[26] H. Mahmood: Application Threat Modeling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/ Search in Google Scholar

[27] D. Eng: Integrated Threat Modelling, The University of Oslo, 2017, Available at: https://www.duo.uio.no/bitstream/handle/10852/55699/dae-thesis.pdf?sequence=1&isAllowed=y Search in Google Scholar

[28] Centar informacijske sigurnosti (CIS): Modeliranje sigurnosnih prijetnji (Threat modeling), 2012, Available at: https://www.cis.hr/files/dokumenti/CISDOC-2012-05-049.pdf Search in Google Scholar

[29] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threat-modeling Search in Google Scholar

[30] S. Kadhirvelan Prakash, A. Söderberg-Rivkin: Threat Modelling and Risk Assessment Within Vehicular Systems, Chalmers University of Technology, University of Gothenburg, Department of Computer Science and Engineering Göteborg, Sweden, 2014, Available at: http://publications.lib.chalmers.se/records/fulltext/202917/202917.pdf Search in Google Scholar

eISSN:
2566-3151
Idioma:
Inglés