0% found this document useful (0 votes)
47 views17 pages

Safeguarding The Internet of Things: Navigating Risks and Embracing Opportunities in Cybersecurity

The document discusses the opportunities and risks of the Internet of Things. It explores notable cybersecurity incidents involving IoT devices and investigates their root causes. It also examines potential strategies for enhancing IoT security.

Uploaded by

hodcsit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views17 pages

Safeguarding The Internet of Things: Navigating Risks and Embracing Opportunities in Cybersecurity

The document discusses the opportunities and risks of the Internet of Things. It explores notable cybersecurity incidents involving IoT devices and investigates their root causes. It also examines potential strategies for enhancing IoT security.

Uploaded by

hodcsit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

SAFEGUARDING THE INTERNET OF THINGS: NAVIGATING RISKS

AND EMBRACING OPPORTUNITIES IN CYBERSECURITY

ABSTRACT

The rapid expansion of the Internet of Things (IoT) entails a convergence of interconnected

devices through the Internet and various networks, enabling them to receive, analyze, and

potentially control external devices, thereby contributing to informed decision-making. The

overarching objective is to enhance the comfort, safety, and efficiency of both personal and

public domains. However, the dynamic evolution of IoT technology brings forth escalating

cybersecurity risks. This article delves into notable cyber incidents within the IoT realm,

investigates the root causes behind such occurrences, and explores potential avenues for

enhancing IoT cybersecurity.

Keywords: Internet of Things (IoT), Cybersecurity, Connected Devices, Network Security,

Information Analysis, Decision-making, Risk Management, Cyber Incidents, IoT Technology,

Safety and Efficiency, Security Risks,Environmental Management,Risk Mitigation


1. INTRODUCTION

In an age where digital transformation is reshaping our daily lives and operational landscapes,

the concept of the Internet of Things (IoT) stands out as one of the most transformative and

potentially revolutionary. The notion of connecting not just computers or smartphones, but a

vast array of devices—from household appliances and wearable gadgets to industrial

machinery and smart city infrastructure—represents a paradigm shift in how we perceive and

interact with technology. At its core, the IoT heralds a vision of a seamlessly interconnected

world where devices, through the marvel of the Internet and various network infrastructures,

communicate, collaborate, and cater to our needs with heightened efficiency and intelligence.

The allure of the IoT lies in its promise. Imagine a world where your refrigerator notifies you

when you're out of milk, where city streetlights adjust their brightness based on real-time

traffic conditions, or where healthcare devices monitor patient vitals and relay critical

information to medical professionals instantaneously. Such scenarios, once the stuff of

science fiction, are rapidly becoming commonplace, illustrating the transformative potential

of the IoT in enhancing the comfort, safety, and overall efficiency of our personal and public
spheres.

Yet, as with all technological revolutions, the rapid evolution and proliferation of IoT devices

bring with them a set of challenges and concerns that cannot be overlooked. Chief among

these is the looming specter of cybersecurity risks. As devices become more interconnected

and integrated into the fabric of our daily lives, they also become potential targets for

malicious actors seeking to exploit vulnerabilities for personal gain, disruption, or sabotage.

The very interconnectedness that empowers IoT devices to analyze data, make informed

decisions, and even control external systems also introduces a myriad of entry points and

potential weak links in the cybersecurity chain.

Fig. 2: General Process of Cybersecurity

This article seeks to navigate the complex landscape of IoT cybersecurity—a domain where

innovation and risk coexist in a delicate balance. We will delve into notable cyber incidents

that have underscored the vulnerabilities inherent in current IoT deployments, examining the

root causes behind such occurrences and shedding light on the multifaceted challenges that

stakeholders must confront. From inherent design flaws and inadequate security protocols to
the proliferation of unsecured devices and the growing sophistication of cyber threats, the

terrain of IoT cybersecurity is fraught with complexities that demand rigorous scrutiny and

proactive intervention.

Moreover, this exploration extends beyond mere analysis, venturing into the realm of

solutions and strategies aimed at bolstering IoT cybersecurity defenses. Recognizing that the

quest for enhanced security is an ongoing and collaborative endeavor, we will explore

potential avenues for innovation, best practices for risk mitigation, and the role of regulatory

frameworks in fostering a secure and resilient IoT ecosystem. By fostering a deeper

understanding of the risks and responsibilities associated with IoT connectivity, we aim to

empower stakeholders—from device manufacturers and service providers to policymakers

and end-users—to make informed decisions that prioritize security without compromising the

transformative potential of the IoT.

In essence, the journey into the heart of IoT cybersecurity is a testament to the intertwined

nature of technological advancement and risk management in the digital age. As we stand on

the precipice of a hyper-connected future, the imperative to forge a path that safeguards both

innovation and security has never been more pressing. Through a comprehensive examination

of the challenges, vulnerabilities, and opportunities that define the IoT landscape, this article

endeavors to contribute to a more secure, informed, and resilient future—one where the

promise of the Internet of Things can be realized without succumbing to the shadows of

cybersecurity threats.

In the epoch of unprecedented technological innovation, the pervasive influence of the

Internet of Things (IoT) emerges as a transformative phenomenon, orchestrating the seamless

convergence of interconnected devices across the vast expanses of the Internet and diverse

networks. This intricate web of connectivity endows these devices with the remarkable ability

to not only receive and analyze data from the external environment but also extends its reach
to the potential control of external devices. This paradigm shift heralds a new era with the

overarching objective of elevating the realms of personal and public life, infusing them with

heightened levels of comfort, safety, and efficiency. Yet, amid the promises of this

interconnected future, the dynamic evolution of IoT technology unfurls a complex tapestry of

escalating cybersecurity risks. This article embarks on a comprehensive exploration of the

IoT landscape, a realm where cyber incidents have become increasingly prevalent and

consequential. The investigation scrutinizes notable instances of cybersecurity breaches

within the IoT ecosystem, seeking to unravel the intricate web of factors that precipitate such

occurrences. As the narrative unfolds, the focus extends beyond mere scrutiny, delving into

the core of the issue to investigate the root causes that underpin these incidents. Moreover,

the discourse navigates towards a proactive stance, venturing into potential avenues and

strategies aimed at fortifying the cybersecurity infrastructure of the IoT landscape. In essence,

this article serves as a beacon, illuminating the multifaceted dimensions of cybersecurity risks

that accompany the rapid expansion of IoT technology. Through critical analysis and

forward-looking insights, it strives to pave the way toward a more secure and resilient future

for the Internet of Things. Additionally, Kevin Ashton introduced the concept of the “Internet

of Things” (IoT) in 1999 , but it took nearly a decade for the IoT market to undergo

significant development. The term "things" encompasses physical objects with individual IP

addresses that can connect to networks, transforming them into "smart" entities capable of

sending and receiving data.In 2015, approximately 14.4 billion "smart" devices were in use, a

number projected to surge by 60% to 23.4 billion in 2017, with estimates foreseeing a further

increase to 30.7 billion by 2020 and a staggering 75.4 billion by 2025 . Currently, the IoT

market spans various domains, including personal life, industry, medicine, urban

development, power engineering, agriculture, and military applications.Smart devices have

significantly enhanced comfort and safety in private life. In the medical field, they enable
continuous remote monitoring of patients, facilitating prompt assistance when needed. The

Industrial Internet of Things (IIoT) forms the bedrock of a burgeoning industrial revolution,

with smart manufacturing pivotal in boosting production efficiency through advanced

automation, data transmission, and artificial intelligence-driven decision-making. Smart cities

further contribute to resource optimization, enhancing population mobility and

security.Regrettably, the proliferation of smart devices has outpaced the attention dedicated

to their secure usage. Consequently, hundreds of millions of devices exhibit vulnerabilities in

both architecture and software, along with flaws in communication protocols. The utilization

of cloud services for storing and analyzing data from these devices has exacerbated the risk

of unauthorized access to sensitive information

2. Opportunities Unleashed by the Internet

Smart homes integrate an array of devices catering to security, climate control, and

household appliances, offering users control and access through smartphones via

Bluetooth, WiFi, or web-based applications. The evolution of house-oriented devices

continues to broaden the spectrum. An illustrative example is the "smart" baby monitor

Aristotle, boasting voice-controlled features and artificial intelligence principles. This

device adapts to a child's development, offering functionalities from storytelling to

retrieving internet-based school curriculum information. In unexpected situations, smart

devices may inadvertently serve critical roles, as seen when an intelligent voice assistant,

triggered during a family dispute, automatically contacted emergency services, averting

potential harm. Projections by Zion Research anticipate substantial growth in the global

smart home market, reaching $53.24 billion by 2022. Wearable smart gadgets, such as

fitness trackers, smartwatches, and virtual reality glasses, are becoming integral to

personal life, encouraging physical activity, expanding interests, and monitoring health.

Intense market competition drives these devices to incorporate advanced features while
becoming more cost-effective. Modern smartwatches, for instance, offer voice commands,

messaging, internet browsing, fitness tracking, sleep monitoring, and music playback.

With substantial internal memory, they remain adaptable to emerging applications,

reflecting the ongoing expansion and diversification of smart technologies. Tractica

forecasts a substantial surge in the global wearable devices market, projecting an increase

to 187.2 million units by 2020, a tenfold rise in just seven years from 2013. This growth is

attributed primarily to the popularity of smartwatches, fitness trackers, and wearable

cameras. In the realm of mHealth (mobile health), wearable devices and wireless

communication play a pivotal role in real-time health monitoring and services, especially

beneficial for chronic patients and individuals requiring continuous supervision, such as

prenatal care or postoperative rehabilitation. Seoul National University's Professor Dae-

Hyeong Kim leads a team developing a revolutionary wearable device for diabetics.

Utilizing a graphene plaster, this device analyzes sweat composition on the hand to

regulate blood sugar levels and administer metformin doses as needed.The Industrial

Internet of Things (IIoT) introduces transformative possibilities across various industry

sectors, including manufacturing, transportation, mining, and energy production. Adopting

an IIoT approach facilitates comprehensive control and optimization throughout the entire

production cycle, from material transportation and storage to the utilization of raw

materials and components. This paradigm shift towards smart manufacturing replaces rigid

closed-loop systems with a flexible approach, enabling the production of goods tailored to

individual market demands and customer preferences. The data generated by intelligent

devices and industrial control systems empower timely and informed decision-making

regarding production efficiency, support services, and enterprise business models. The

complexity and volume of this data necessitate the application of cloud computing,

artificial intelligence, and real-time analysis to facilitate optimal decision-making


processes. The foundation of an IoT strategy is instrumental in establishing cost-effective,

environmentally friendly, and intelligent urban centers. A network of electronic sensors,

extensively dispersed and interconnected throughout the city via the Internet and other

networks, facilitates real-time data collection, analysis, and decision-making across vital

aspects of urban life—ranging from transportation and lighting to heat supply, waste

management, and goods turnover. This interconnected infrastructure not only provides

crucial information to city residents and visitors but also supports community services.

Smart vehicles, whether privately owned or part of shared mobility solutions, can optimize

travel routes, saving both time and operational costs for passengers. Intelligent traffic light

systems contribute to the swift response of emergency vehicles by minimizing delays.

Moreover, smart street lighting, attuned to factors like weather conditions, the presence of

transportation and pedestrians, enables the optimization of electricity consumption.

Several cities, including Dubai, China, and Barcelona, have successfully implemented

smart city technologies, demonstrating the tangible benefits of these advancements.An

exemplary manifestation of the IoT approach is witnessed in the Smart Agriculture project

in Salerno, Italy. This initiative illustrates an integrated accounting and analysis of

multiple factors to achieve optimal outcomes. Real-time data acquisition from fields,

combined with considerations of current and future weather conditions, soil

characteristics, water availability, and energy resources, ensures the production of cost-

effective, high-quality agricultural products. The success of such projects underscores the

transformative potential of IoT strategies in enhancing efficiency and sustainability across

diverse sectors.

3. Navigating the Hazards of the Internet

The swift integration of IoT technology, coupled with its immense advantages,

introduces noteworthy risks stemming from vulnerabilities inherent in smart devices.


These vulnerabilities encompass both the software and hardware components of the

devices, their communication protocols, and the storage and processing of data in

smartphones, tablets, data centers, and cloud structures. The prevalence of default

passwords and unpatched firmware creates a susceptibility that makes compromising

these devices relatively straightforward for attackers. Developers often leave default

passwords to facilitate remote servicing of devices, but users frequently neglect to

change them, assuming they are of no interest to potential intruders. Similarly, the

installation of patches, recommended by developers to rectify identified

vulnerabilities, is often overlooked by users.Another contributing factor to the low

security of smart devices is their limited computational resources, preventing the

implementation of complex cryptographic algorithms, especially as manufacturers

strive to reduce costs in a competitive market. When consumers choose devices, such

as those for a smart home, assessing their security proves challenging, and

affordability often guides their decisions. Sellers, motivated by increasing sales,

typically do not prioritize offering advice on the security of their product range.The

communication protocols employed by smart devices exhibit significant

vulnerabilities. The ZigBee protocol, a widely used wireless communication standard

for smart homes, is implemented by major vendors like Toshiba, Philips, Huawei,

Sony, Siemens, Samsung, and Motorola. However, this protocol has been identified

with serious vulnerabilities, as outlined in a technical paper. The ZigBee protocol's

flaws allow for the remote penetration of a network of smart devices, enabling the

rapid infection of nearby devices and facilitating the spread across the network in a

manner analogous to a nuclear chain reaction. The current challenge lies in addressing

these vulnerabilities promptly, considering their widespread impact across various

devices. Research on the Bluetooth protocol has revealed significant security gaps,
impacting the more than 8 billion devices globally utilizing this protocol.

Vulnerabilities extend to a variety of devices and are evident in protocol

implementations across Android, iOS, Windows, and Linux systems. While relatively

new devices can address vulnerabilities through patch installations, the staggering

number of over 2 billion outdated devices lacking manufacturer support remains

exposed to potential threats.Introduced by the WiFi Alliance in 2003, the WiFi

Protected Access (WPA) protocol aimed to secure wireless data exchange in

networks, with an improved version, WPA2, available since 2004. However, recent

studies have identified serious weaknesses in this widely employed protocol, allowing

attackers to intercept and decrypt traffic, gaining unauthorized access to encrypted

information like credit card numbers, passwords, emails, and more.Identifying

vulnerable devices has become increasingly accessible with the aid of search engines

like Shodan and Censys , enabling the discovery of insecure webcams and

unauthorized access to monitored locations such as private rooms, banks, schools, and

roads. This heightened vulnerability amplifies cases of illegal intrusion into private

lives, businesses, and organizations.The proliferation of vulnerable smart devices

creates a new landscape for cybercriminals, offering easy detection through Internet

scanning. Criminals leverage this to orchestrate large-scale infections, transforming

these devices into a formidable army of robots for malicious purposes. Notably, the

Mirai malware, a self-propagating botnet virus emerging in August 2016,

demonstrated the capability to compromise Linux-based smart devices, forming

potent Mirai botnets. Cybercriminals harnessed Mirai-based botnets for highly

impactful Distributed Denial of Service (DDoS) attacks, affecting targets like

journalist Brian Krebs's website, the French cloud computing company OVN, and the

DNS provider Dyn. The vast scale of these attacks underscores the potential risks
associated with the widespread use of vulnerable smart devices. The assault on Dyn

servers on October 21, 2016, resulted in the disruption of over 70 services in the USA,

paralyzing prominent entities such as BBC, CNN, Fox News, PayPal, and VISA from

7 a.m. to 6 p.m. during the attack. With malicious requests emanating from tens of

millions of IP addresses, a colossal flow of approximately 1.2 TB/sec overwhelmed

the Dyn Domain Name System Infrastructure.The escalating number of smart devices,

coupled with the pervasive disregard for their security, amplifies the risk of their

exploitation for criminal objectives. These attacks transcend individual organizations,

posing a profound threat to critical state infrastructure, encompassing energy,

transportation, and informatization. Several factors contribute to the insecurity of

smart devices. The absence of standards or obligatory official recommendations for

Internet of Things (IoT) security, the vast array of devices available, and the lack of

legislative acts defining responsibilities among manufacturers, sellers, and clients all

contribute to the compromised security landscape. Manufacturers, aiming to cut costs,

often skimp on security measures, prioritizing affordability over robust protective

measures. For many users, cost considerations outweigh security concerns, leading to

a general neglect of recommended security practices, including the adoption of strong

passwords, timely patch updates, and certified downloads.

The Profound Impact and Imperative of Securing the Internet of Things (IoT) in the Era of

Industry 4.0

The digital landscape is undergoing a seismic shift, and at the epicenter of this transformation

lies the Internet of Things (IoT). From urban centers to rural landscapes, from individual

homes to sprawling industries, the pervasive influence of IoT devices is reshaping the very

fabric of our existence. This omnipresence, however, brings forth a myriad of challenges that

extend beyond technological considerations, permeating the realms of individual privacy,


societal structures, state activities, and even the intricate web of interstate relations.

A Catalyst for Change: The Role of IoT in Industry 4.0

As we navigate the complexities of the 21st century, we find ourselves at the cusp of the

fourth industrial revolution, often referred to as Industry 4.0. This transformative phase is

characterized by the fusion of digital technologies, the Internet of Things, artificial

intelligence, and data analytics, among others, to create a synergistic ecosystem that drives

unparalleled efficiency, innovation, and connectivity. The IoT, in this context, emerges as a

linchpin—a fundamental component that facilitates real-time data exchange, automation, and

intelligent decision-making across a spectrum of applications, from smart factories and

autonomous vehicles to healthcare systems and smart cities.

Fig. 3: Evolution Based on IoT

The implications of this interconnected paradigm are far-reaching. On an individual level,

IoT devices promise enhanced convenience, personalized experiences, and a heightened


quality of life. In the broader societal context, they herald advancements in healthcare,

transportation, energy management, and environmental sustainability, to name a few. At the

state and interstate levels, the strategic integration of IoT technologies into governance,

defense, infrastructure, and international relations introduces new avenues for cooperation,

competition, and potential conflict.

The Imperative of Security: Safeguarding the IoT Ecosystem

However, the rapid proliferation and integration of IoT devices also expose vulnerabilities

that can have profound implications for security, privacy, and trust. A breach in an IoT

network can compromise sensitive personal data, disrupt critical infrastructure, and even pose

national security risks. Thus, as we embrace the promise of Industry 4.0, the imperative of

enhancing the security posture of IoT devices across their entire life cycle becomes

paramount.

This journey begins at the foundational level—with chip manufacturing and hardware design.

Ensuring the integrity and security of hardware components is fundamental to building a

robust IoT ecosystem resilient to physical tampering, counterfeit components, and hardware-

based attacks. Concurrently, the development of core and communication software demands

rigorous scrutiny, encompassing secure coding practices, vulnerability assessments, and

robust encryption mechanisms to thwart malicious exploits and data breaches.

Equally critical is the application design phase, where user interfaces, data storage, and

transmission protocols must be designed with security as a guiding principle. Adopting a

holistic approach that integrates security considerations at each stage of the device life cycle

is essential to fostering a secure, trustworthy, and resilient IoT ecosystem.

International Collaboration: Forging a Unified Approach to IoT Security

Yet, the challenge of securing the IoT landscape transcends national boundaries, necessitating
a collaborative and coordinated international response. The interconnected nature of global

supply chains, communication networks, and geopolitical dynamics underscores the need for

harmonized standards, protocols, and best practices to fortify IoT security on a global scale.

International collaboration is essential in formulating standards and recommendations that

reflect diverse perspectives, expertise, and stakeholder interests. Collaborative initiatives can

facilitate the exchange of knowledge, expertise, and resources, fostering innovation while

mitigating risks associated with disparate regulatory frameworks, technological disparities,

and geopolitical tensions.

Legal Accountability and User Empowerment: Building Trust in the IoT Era

Beyond technological and collaborative measures, establishing legal accountability

mechanisms is crucial to incentivizing manufacturers to prioritize information security in

their smart devices. Imposing legal obligations and liabilities can foster a culture of

responsibility, encouraging proactive risk management, transparency, and accountability

throughout the IoT supply chain.

Furthermore, empowering smart device users with knowledge and awareness is paramount to

navigating the complexities of the digital landscape. Enhancing user education and awareness

regarding the security implications of IoT devices can foster informed decision-making,

responsible usage, and active engagement in safeguarding personal and collective security.

4. CONCLUSION

The evident and escalating impact of the Internet of Things (IoT) on individuals, societal

dynamics, state activities, and interstate relations underscores its role as a fundamental

component of the ongoing industrial revolution, notably Industry 4.0—a transformative phase

in human societal evolution [24]. Robust measures are imperative to enhance the security of

smart devices across their entire life cycle, encompassing chip manufacturing, hardware
design, core and communication software development, and application design. International

collaboration is essential in formulating standards and recommendations to fortify security in

this realm. Imposing legal accountability on manufacturers for the information security of

their smart devices is crucial. Additionally, there is a pressing need to augment the

knowledge of smart device users regarding the security, or lack thereof, pertaining to the

information generated and transmitted by these devices.

5. REFERENCES

1. Arik Gabbal. Kevin Ashton Describes "the Internet of Things." Smithsonian Magazine

(January 2015). Available at: http://www.smithsonianmag.com/innovation/kevin-ashton-

describes-the-internet-of-things-180953749/

2. IHS TECHNOLOGY. IoT platforms: enabling the Internet of Things. (March 2016).

Available at: https://cdn.ihs.com/www/pdf/enabling-IOT.pdf

3. Edward C. Baig. Mattel's Aristotle is like an Amazon Echo for kids. USA Today. (January

3, 2017). Available at:

https://www.usatoday.com/story/tech/columnist/baig/2017/01/03/mattel-brings-artificial-

intelligence-and-internet-things-into-kids-rooms/96081330/

4. Jon Fingas. Smart home gadget ends a violent dispute by calling police (July 9, 2017).

Available at: https://www.engadget.com/2017/07/09/google-home-calls-police-on-violent-

dispute/

5. Zion Market Research. Global Smart Home Market is Set for a Rapid Growth and is

Expected to Reach around USD 53.45 Billion by 2022. (January 18, 2017). Available at:

https://www.zionmarketresearch.com/news/smart-home-market

6. Tractica Market Research. Wearable Device Shipments to Reach 187 Million Units

Annually by 2020. (February 19, 2015). Available at:


https://www.tractica.com/newsroom/press-releases/wearable-device-shipments-to-reach-197-

million-units-annually-by-2020/

7. Robert S. H. Istepanian, Bryan Woodward. m-Health: Fundamentals and Applications.

(January, 2017). ISBN: 978-1-118-49698-5. Wiley-IEEE Press.

8. Sam Wong. Graphene smart patch for monitoring diabetes could save lives. New

Scientist. (March 22, 2016). Available at:https://www.newscientist.com/article/mg22930661-

900-smart-patch-for-diabetes/

9. The Industrial Internet of Things (IIoT): the business guide to Industrial IoT. I-SCOOP.

Available at: https://www.i-scoop.eu/internet-of-things-guide/industrial-internet-things-iiot-

saving-costs-innovation/

10. Aisha Bin Bishr. How digital technology is transforming Dubai. World Economic Forum.

(May 16, 2017). Available at: https://www.weforum.org/agenda/2017/05/how-digital-

technology-is-transforming-dubai

11. Juan Pedro Tomas. China Unicom partners with Shanghai on smart city initiative. RCR

Wireless News. (May 13, 2016). Available at: https://www.rcrwireless.com/20160513/asia-

pacific/china-unicom-partners-shanghai-smart-city-initiative-tag23

12. Lucas Laursen. Barcelona’s Smart City Ecosystem. MIT Technology Review. (November

18, 2014). Available at: https://www.technologyreview.com/s/532511/barcelonas-smart-city-

ecosystem/

13. Smart Agriculture project in Salerno (Italy)... Libelium Word. (October 24, 2017).

Available at: http://www.libelium.com/smart-agriculture-project-in-salerno-italy-to-monitor-

baby-leaves-fourth-generation-vegetables-production-for-an-efficient-use-of-fertilizers-and-

irrigation/

14. Elyse Betters and Chris Hall. What is ZigBee and why is it important for your smart
home?. Pocket-lint. (September 27, 2017). Available at: http://www.pocket-

lint.com/news/129857-what-is-zigbee-and-why-is-it-important-for-your-smart-home

15. Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten. IoT Goes Nuclear:

Creating a ZigBee Chain Reaction. Pocket-lint. (September 27, 2017). Available at

http://iotworm.eyalro.net/iotworm.pdf

16. Luca Carettoni, Claudio Merloni, Stefano Zanero. Studying Bluetooth Malware

Propagation: The BlueBag Project. IEEE Security & Privacy (Vol. 5, Issue 2, March-April

2007). ISSN: 1540-7993.

17. Praveen Kumar Mishra. Bluetooth Security Threats. Int. Journal of Computer Science &

Engineering Technology. (Vol. 4, No. 02, February 2013). ISSN: 2229-3345. Available at:

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.478.651&rep=rep1&type=pdf

18. Ben Seri, Gregory Vishnepolsky. BlueBorn Technical White Paper. (2017). ARMIS.

Available at:

http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper%201.pdf?t=151076

0820326

You might also like