IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats

Author First name, Last name, Institution

Mathew Nicho, Zayed University
Shini Girija

Document Type

Conference Proceeding

Source of Publication

2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)

Publication Date

12-22-2021

Abstract

The Internet of Things (IoT), which has accelerated the digital transformation technology revolution, has enabled cyber-physical digital transformation strategies and accelerated business automation. In a Covid-19 related Harvard Business Review study, 95 per cent of executives agreed that digital transformation strategies had become increasingly important. This highlights the critical importance of being prepared for IoT vulnerabilities and attacks. Mapping IoT devices to identify their vulnerabilities and attack allows academics and practitioners to identify, analyze, and mitigate IoT-related concerns. In this paper, we categorize IoT sensors, their IoT related vulnerabilities, and the IoT attacks that affect them and propose a model that maps the relationships among them. Our model provides valuable insights into IoT attack vectors and associated vulnerabilities with consumer IoT devices.

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Volume

00

Disciplines

Computer Engineering

Indexed in Scopus

no

Open Access

no

Share

COinS