Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published June 9, 2022 | Version v1
Journal article Open

Investigating Wireless and Internet of Things Technologies Security Threats and Attacks

  • 1. Southern University and A&M College, College of Sciences and Engineering Baton Rouge, LA 70813 – USA

Description

Wireless and mobile devices are part of our lives. Wireless technology encompasses Internet of Things (IoT). Some key features of these devices are sensors, connectivity, and artificial intelligence and they can be found in health clinics, homes, buildings, vehicles, cities, wearables, etc. However, wireless and IoT technologies are sources of a variety of security threats to privacy and data and are becoming targets for attackers or hackers. In this paper, the authors strive to answer to the following research questions: 1) What types of threats can wireless and IoT technologies pose? 2) What type of threats can be exploited for attack and how? 3) What techniques are used to mitigate the threats and attacks? 4) What can wireless and IoT users do to protect their privacy and data? As a result, we investigate different types of security threats and attacks, and common security countermeasures used in wireless and IoT.

Files

14322ijwmn01.pdf

Files (1.1 MB)

Name Size Download all
md5:94bbc5168ab6f1d5e3067a2094c412e3
1.1 MB Preview Download