Developing models of IoT infrastructures to identify vulnerabilities and analyse threats

Abstract

This article describes the developing stands of typical IoT infrastructure Technologies, which are designed to identify vulnerabilities and analyse potential threats. Scenarios of attacks typical for such systems have been developed, and the consequences of implementing attacks have been determined. Attacker can use the developed scenarios, been motivated by different goal

    Similar works