dc.contributor.author | Nykänen, Annika | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.editor | Shishkov, Boris | |
dc.date.accessioned | 2024-01-12T08:41:28Z | |
dc.date.available | 2024-01-12T08:41:28Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Nykänen, A., & Costin, A. (2023). A View on Vulnerabilities Within IoT Devices in the Smart Home Environment. In B. Shishkov (Ed.), <i>Business Modeling and Software Design : 13th International Symposium, BMSD 2023, Utrecht, The Netherlands, July 3-5, 2023, Proceedings</i> (pp. 365-374). Springer Nature Switzerland. Lecture Notes in Business Information Processing, 483. <a href="https://doi.org/10.1007/978-3-031-36757-1_27" target="_blank">https://doi.org/10.1007/978-3-031-36757-1_27</a> | |
dc.identifier.other | CONVID_183768878 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/92758 | |
dc.description.abstract | The number of different devices connected to the Internet is constantly increasing. There is a high demand for these devices, and their benefits are clear for certain groups of users. Some of these devices, the Internet of Things (IoT), are part of smart homes, making the residents’ everyday lives easier and safer. In general, the security of IoT devices is constantly improving, but overall, they are still full of vulnerabilities. The purpose of this paper is to explain the most significant threats to IoT devices in the smart home environment and propose a number of different ways to eliminate these threats and vulnerabilities in smart home IoT devices. It is important to acknowledge that both the manufacturers of IoT devices and their users are responsible for taking care of the vulnerabilities. | en |
dc.format.extent | 394 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer Nature Switzerland | |
dc.relation.ispartof | Business Modeling and Software Design : 13th International Symposium, BMSD 2023, Utrecht, The Netherlands, July 3-5, 2023, Proceedings | |
dc.relation.ispartofseries | Lecture Notes in Business Information Processing | |
dc.rights | In Copyright | |
dc.subject.other | internet of things | |
dc.subject.other | smart homes | |
dc.subject.other | cybersecurity | |
dc.subject.other | vulnerability | |
dc.title | A View on Vulnerabilities Within IoT Devices in the Smart Home Environment | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202401121259 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-3-031-36756-4 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 365-374 | |
dc.relation.issn | 1865-1348 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | International Symposium on Business Modeling and Software Design | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | esineiden internet | |
dc.subject.yso | älytalot | |
dc.subject.yso | haavoittuvuus | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24344 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25011 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-031-36757-1_27 | |
dc.type.okm | A4 | |