REFERENCES

1. Palo Alto Networks. 2020 unit 42 IoT threat report. Available from: https://unit42.paloaltonetworks.com/iot-threat-report-2020/. [Last accessed on 22 Nov 2022].

2. Kshetri N, Voas JM. Cryptojacking. Computer 2022;55:18-19.

3. Porras PA, Saïdi H. A foray into conficker's logic and rendezvous points. In: Lee W, editor. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09. USENIX Association; 2009.

4. Networks P. The connected enterprise: IoT security report 2021. Available from: https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/research/connected-enterprise-iot-security-report-2021. [Last accessed on 22 Nov 2022].

5. Certified P. Security report 2021: bridging the gap; 2021. (Last accessed) January 2022.

6. Cisco. Fog computing and the internet of things: extend the cloud to where the things are. Available from: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf. [Last accessed on 22 Nov 2022].

7. IDC. IDC futureScape: worldwide internet of things 2015 predictions. Available from: https://www.businesswire.com/news/home/20141203006197/en/IDC-Reveals-Worldwide-Internet-of-Things-Predictions-for-2015. [Last accessed on 22 Nov 2022].

8. Mach P, Becvar Z. Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv 2017;19:1628-56.

9. ISO. ISO/IEC 27001 - information security management. Available from: https://www.iso.org/isoiec-27001-information-security.html. [Last accessed on 22 Nov 2022].

10. Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W. Anatomy of threats to the internet of things. IEEE Commun Surv Tutor 2019;21:1636-75.

11. Mayes K, Markantonakis K. Smart cards, tokens, security and applications. 1st ed. Springer; 2007.

12. Anderson RJ. In: Security engineering - a guide to building dependable distributed systems. second edition ed. Wiley; 2008. Available from: https://www.amazon.com/Security-Engineering-Building-Dependable-Distributed/dp/0470068523. [Last accessed on 22 Nov 2022].

13. Tria A, Choukri H. Invasive attacks. In: van Tilborg HCA, Jajodia S, editors. Encyclopedia of cryptography and security (2nd Ed.). Springer; 2011. pp. 623-29.

14. Helfmeier C, Nedospasov D, Tarnovsky C, et al. Breaking and entering through the silicon. In: Sadeghi A, Gligor VD, Yung M, editors. ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. ACM; 2013. pp. 733-44.

15. Filipovic B, Schimmel O. Protecting embedded systems against product piracy: technological background and preventive measures. Available from: https://www.aisec.fraunhofer.de/content/dam/aisec/Dokumente/Publikationen/Studien_TechReports/englisch/Whitepaper_ProductProtection.pdf. [Last accessed on 22 Nov 2022].

16. Hutle M, Kammerstetter M. Resilience against physical attacks. In: Skopik F, Smith P, editors. Smart Grid Security: innovative solutions for modernized grid. Syness 2015. pp. 79-112.

17. Swapp S, University of Wyoming. Scanning eletron microscopy(SEM). Available from: http://serc.carleton.edu/research_education/geochemsheets/techniques/SEM.html. [Last accessed on 22 Nov 2022].

18. The university of Iowa. Transmission electron microscopy. Available from: http://cmrf.research.uiowa.edu/transmission-electron-microscopy. [Last accessed on 22 Nov 2022].

19. Torrance R, James D. The state-of-the-art in IC reverse engineering. In: Clavier C, Gaj K, editors. 11th International Workshop Cryptographic Hardware and Embedded Systems - CHES. vol. 5747 of Lecture Notes in Computer Science. Springer; 2009. pp. 363-81.

20. Kömmerling O, Kuhn MG. Design principles for tamper-resistant smartcard processors. Available from: https://www.usenix.org/legacy/publications/library/proceedings/smartcard99/full_papers/kommerling/kommerling.pdf. [Last accessed on 22 Nov 2022].

21. Bar-El H, Bar H. Discretix Technologies Ltd. Known attacks against smartcards. Available from: https://www.siliconinvestigations.com/REF/sftsec.pdf. [Last accessed on 22 Nov 2022].

22. Tague P, Poovendran R. Modeling Node Capture Attacks in Wireless Sensor Networks. Available from: https://mews.sv.cmu.edu/papers/allerton-08.pdf. [Last accessed on 22 Nov 2022].

23. Butun I, Österberg P, Song H. Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor 2020;22:616-44.

24. Xie H, Yan Z, Yao Z, Atiquzzaman M. Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J 2019;6:2205-24.

25. Lo O, Buchanan WJ, Carson D. Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). J Cyber Secur Technol 2017;1:88-107.

26. C A, Roy B, Mandarapu BSV, Menezes B. "S-Box" implementation of AES is not side channel resistant. J Hardw Syst Secur 2020;4:86-97.

27. Brisfors M, Forsmark S. Deep-learning side-channel attacks on AES.

28. Heyszl J, Miller K, Unterstein F, et al. Investigating profiled side-channel attacks against the DES key schedule. TCHES 2020:22-72.

29. Zhou Y, Feng D. Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. Available from: https://eprint.iacr.org/2005/388.pdf. [Last accessed on 22 Nov 2022].

30. Finke T, Gebhardt M, Schindler W. A new side-channel attack on RSA prime generation. In: Clavier C, Gaj K, editors. Cryptographic Hardware and Embedded Systems - CHES 2009. CHES 2009. Lecture Notes in Computer Science, vol 5747. Springer, Berlin, Heidelberg.

31. Msgna M, Markantonakis K, Mayes K. Precise instruction-level side channel profiling of embedded processors. In: Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. vol. 8434 of Lecture Notes in Computer Science. Springer; 2014. pp. 129-43.

32. Msgna M, Markantonakis K, Naccache D, Mayes K. Verifying software integrity in embedded systems: A side channel approach. In: Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. vol. 8622 of Lecture Notes in Computer Science. Springer; 2014. pp. 261-80.

33. Msgna M, Markantonakis K, Mayes K. The B-side of side channel leakage: control flow security in embedded systems. vol. 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer; 2013. pp. 288–304.

34. Sayakkara A, Le-Khac NA, Scanlon M. Leveraging electromagnetic side-channel analysis for the investigation of IoT devices. Digit Investig 2019;29:94-103.

35. Kune DF, Ransford BA, Holcomb DE. Anomaly and malware detection using side channel analysis. Available from: https://patentimages.storage.googleapis.com/a0/c2/5d/d6df3332818d5c/WO2016115280A1.pdf. [Last accessed on 22 Nov 2022].

36. McDonald T. Side-Channel based detection of malicious software. In: 7th Software Security, Protection and Reverse Engineering Workshop (SSPREW); 2017.

37. Liou J, Jain S, Singh SR, Taksinwarajan D, Seneviratne S. Side-channel information leaks of Z-wave smart home IoT devices: demo abstract. In: Nakazawa J, Huang P, editors. SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, Virtual Event, Japan, November 16-19, 2020. ACM; 2020. pp. 637-8.

38. Pammu AA, Chong K, Ho W, Gwee B. Interceptive side channel attack on AES-128 wireless communications for IoT applications. In: 2016 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS; 2016. pp. 650-3.

39. Mirtskhulava L, Globa L, Meshveliani N, Gulua N. Cryptanalysis of internet of things (IoT) wireless technology. In: 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo); 2019. pp. 1-4.

40. Tewari A, Gupta BB. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 2017;73:1085-102.

41. Dwivedi AD. Security analysis of lightweight IoT cipher: chaskey. Cryptography 2020;4:22.

42. Chan A, Liu X, Noubir G, Thapa B. Broadcast control channel jamming: resilience and identification of traitors. Int Symp Inf Theory 2007:2496-500.

43. Chan H, Perrig A. Security and privacy in sensor networks. Computer 2003;36:103-5.

44. Khan W, Xiang Y, Aalsalem M, Arshad Q. The selective forwarding attack in sensor networks: detections and countermeasures. Int J Microw Wirel Technol 2012;2:33-44.

45. Bysani LK, Turuk AK. A survey on selective forwarding attack in wireless sensor networks. In: 2011 International Conference on Devices and Communications (ICDeCom); 2011. pp. 1-5.

46. Zhang Y, Minier M. Selective forwarding attacks against data and ACK flows in network coding and countermeasures. J Comput Netw Commun 2012; doi: 10.1155/2012/184783.

47. Zhang Q, Zhang W. Accurate detection of selective forwarding attack in wireless sensor networks. Int J Distrib Sens Netw 2019;15.

48. Yu B, Xiao B. Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings 20th IEEE International Parallel Distributed Processing Symposium; 2006.

49. Wood AD, Stankovic JA. Denial of service in sensor networks. Computer 2002;35:54-62.

50. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications; 2003. pp. 113-27.

51. Zimba A, Chishimba M. Exploitation of DNS tunneling for optimization of data exfiltration in malware-free APT intrusions. Available from: https://ictjournal.icict.org.zm/index.php/zictjournal/article/view/26/13. [Last accessed on 22 Nov 2022].

52. Sammour M, Hussin B, Othman MFI, Doheir M, et al. DNS tunneling: a review on features. Available from: https://www.researchgate.net/profile/Mohammed-Talib/publication/327097730_DNS_Tunneling_a_Review_on_Features/links/5b77aa5c299bf1d5a711cb93/DNS-Tunneling-a-Review-on-Features.pdf. [Last accessed on 22 Nov 2022].

53. Do V, Engelstad PE, Feng B, Thanh D. Detection of DNS tunneling in mobile networks using machine learning; 2017. pp. 221-30.

54. ScienceDirect. Denial-of-service attack. Available from: https://www.sciencedirect.com/topics/engineering/denial-of-service-attack. [Last accessed on 22 Nov 2022].

55. Zhao K, Ge L. A survey on the internet of things security. In: International Conference on Computational Intelligence & Security; . pp. 663-7.

56. Alanazi S, Al-Muhtadi J, Derhab A, et al. On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: Application & Services in International Conference on EHealth Networking.

57. Džaferović E, Sokol A, Almisreb A, Mohd Norzeli S. DoS and DDoS vulnerability of IoT: a review. Available from: https://pdfs.semanticscholar.org/de0e/93281cd7005cb17e2426614985766a41a4dd.pdf. [Last accessed on 22 Nov 2022].

58. Liang L, Zheng K, Sheng Q, Huang X. A denial of service attack method for an IoT system. In: 2016 8th International Conference on Information Technology in Medicine and Education (ITME); 2016. pp. 360-64.

59. Olshansky S, Wilton R. Internet of things devices as a DDoS vector. Available from: https://www.internetsociety.org/blog/2019/04/internet-of-things-devices-as-a-ddos-vector/. [Last accessed on 22 Nov 2022].

60. Vlajic N, Zhou D. IoT as a land of opportunity for DDoS hackers. Computer 2018;51:26-34.

61. Cybersecurity TNJ, (NJCCIC) CIC. Mirai Botnet. Available from: https://web.archive.org/web/20161212084605/https://www.cyber.nj.gov/threat-profiles/botnet-variants/mirai-botnet. [Last accessed on 22 Nov 2022].

62. Kumar D, Shen K, Case B, et al. All things considered: an analysis of IoT devices on home networks. Available from: https://www.usenix.org/system/files/sec19-kumar-deepak_0.pdf. [Last accessed on 22 Nov 2022].

63. Markowsky L, Markowsky G. Scanning for vulnerable devices in the internet of things.

64. Agarwal S, Oser P, Lueders S. Detecting IoT devices and how they put large heterogeneous networks at security risk. Sensors 2019;19:4107.

65. GitHub Inc. IoTSeeker. Available from: https://github.com/rapid7/IoTSeeker. [Last accessed on 22 Nov 2022].

66. Harrison V, Pagliery J. Nearly 1 million new malware threats released every day. Available from: https://money.cnn.com/2015/04/14/technology/security/cyber-attack-hacks-security/. [Last accessed on 22 Nov 2022].

67. Antonopoulos A, Kapatsori C, Makris Y. Hardware trojans in analog, mixed-signal, and RF ICs; 2018. pp. 101-23.

68. Yang K, Hicks M, Dong Q, Austin T, Sylvester D. A2: analog malicious hardware. In: 2016 IEEE symposium on security and privacy (SP); 2016. pp. 18-37.

69. Milosevic J, Sklavos N, Koutsikou K. Malware in IoT software and hardware. Available from: https://upcommons.upc.edu/bitstream/handle/2117/99318/FCTRU_2016_paper_29.pdf. [Last accessed on 22 Nov 2022].

70. Ngo QD, Nguyen HT, Van-HoangLe, Nguyen DH. A survey of IoT malware and detection methods based on static features. ICT Express 2020;6:280-6.

71. Senate Bill No 327. Available from: https://openstates.org/ca/bills/20172018/SB327/. [Last accessed on 22 Nov 2022].

72. Heartfield R, Gan D. Social engineering in the internet of everything. Available from: https://gala.gre.ac.uk/id/eprint/16718/7/16718%20GAN_Social_Engineering_in_the_Internet_of_Everything_2016.pdf. [Last accessed on 22 Nov 2022].

73. McAfee. Social engineering in the internet of things (IoT). Available from: https://www.mcafee.com/blogs/other-blogs/executive-perspectives/social-engineering-internet-things-iot/. [Last accessed on 22 Nov 2022].

74. Ahmed M, Pathan AK. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt Syst Model 2020;8:4.

75. Deng R, Xiao G, Lu R, Liang H, Vasilakos A. False data injection on state estimation in power systems - attacks, impacts, and defense: a survey. IEEE Trans Industr Inform 2017;13:411-23.

76. Leyden J. McAfee: patient monitoring systems open to hack attacks. Available from: https://www.theregister.com/2018/08/14/patient_monitor_hack/. [Last accessed on 22 Nov 2022].

77. Ahmed M, Ullah ASSMB. False data injection attacks in healthcare. In australasian conference on data mining. Springer; 2007. pp. 192-202.

78. Symantec. The shamoon attacks. Available from: https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey. [Last accessed on 22 Nov 2022].

79. Mercer W, Rascagneres P. Olympic destroyer takes aim at winter olympics. Available from: https://blog.talosintelligence.com/2018/02/olympic-destroyer.html. [Last accessed on 22 Nov 2022].

80. Falcone R. Shamoon 3 Targets Oil and Gas Organization. Available from: https://unit42.paloaltonetworks.com/shamoon-3-targets-oil-gas-organization/. [Last accessed on 22 Nov 2022].

81. Perlroth N, Panja T. Microsoft says Russians hacked antidoping agency computers. Available from: https://www.nytimes.com/2019/10/28/sports/olympics/russia-doping-wada-hacked.html. [Last accessed on 22 Nov 2022].

82. Wazid M, Das AK, Khan MK, et al. Secure authentication scheme for medicine anti-counterfeiting system in IoT environment. IEEE Internet Things J 2017;4:1634-46.

83. Zhou J, Cao Z, Dong X, Lin X, Vasilakos AV. Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel Commun 2013;20:12-21.

84. Lin C, He D, Huang X, Choo KKR, Vasilakos AV. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 2018;116:42-52.

85. Yang H, Yuan J, Li C, et al. BrainIoT: brain-like productive services provisioning with federated learning in industrial IoT. IEEE Internet Things J 2022;9:2014-24.

86. Srinivas J, Das AK, Wazid M, Vasilakos AV. Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet Things J 2021;8:7727-44.

87. Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, 2003.; 2003. pp. 197- 213.

88. Xiao Y, Rayi VK, Sun B, Du X, Hu F, et al. A survey of key management schemes in wireless sensor networks. Computer Communications 2007;30:2314-41.

90. Du W, Deng J, Han Y, et al. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur 2005;8:228-58.

91. Weingart SH. Physical security devices for computer subsystems: a survey of attacks and defenses. In: Koç ÇK, Paar C, editors. Cryptographic hardware and embedded systems - CHES 2000. Berlin, Heidelberg: Springer Berlin Heidelberg; 2000. pp. 302-17.

92. Research R. Under the hoodie: lessons from a Season of Penetration Testing. Available from: https://www.rapid7.com/globalassets/_pdfs/research/rapid7-under-the-hoodie-2018-research-report.pdf. [Last accessed on 22 Nov 2022].

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/