Tytuł artykułu
Autorzy
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This paper investigates the obstacles and resolutions concerning the security of communication in the Internet of Things (IoT). It commences with a discussion of the remarkable proliferation of internet-connected devices, ranging from personal computers to mobile devices, and now to the era of IoT and IoE. The paper illuminates the impact of IoT on network addresses, leading to the depletion of IPv4 addresses and the necessity for address translation services. Subsequently, the article delves into the risks confronted by IoT systems, encompassing physical and digital assaults, unauthorized access, system failures, as well as diverse forms of malicious software. The significance of IoT security in industrial and agricultural systems is underscored. Finally, the paper concludes by presenting strategies to combat these risks, including antivirus countermeasures, safeguards against Distributed Denial-of-Service (DDoS) attacks, and security considerations in IoT systems for agriculture. In essence, this paper offers valuable insights into the challenges and solutions associated with ensuring the security of IoT communication.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
69--90
Opis fizyczny
Bibliogr. 124 poz., rys.
Twórcy
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Department of Complex Systems, Poland
autor
- Rzeszow University of Technology, Machine Learning Student Science Club, Poland
Bibliografia
- 1. Adamkiewicz, S.L., (2005). The correlation between productivity and the use of information security controls in small businesses. The George Washington University.
- 2. Adriani, Y., Asyifa, C., (2022). The Use of Technological Devices: A Descriptive Study of Students in University. International Conference on Science and Technology (ICOSTECH). doi: 10.1109/icostech54296.2022.9829086
- 3. Ahmad, S., Badwelan, A., Ghaleb, A. M., Qamhan, A., Sharaf, M., (2018). Analyzing critical failures in a production process: Is industrial IoT the solution? Wireless Communications and Mobile Computing, 1–12.
- 4. Alqinsi, P., Edward, I.J.M., Ismail, N., Darmalaksana, W., (2018). IoT-Based UPS monitoring system using MQTT protocols. In: 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1–5.
- 5. Ashton, K., (2009). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114.
- 6. Baker, F.C., (2021). Inadequacy of Existing Security Management Frameworks in Addressing Internet of Things (IoT) Cybersecurity-Related Risks. Doctoral dissertation. Northcentral University.
- 7. Baranwal, T., Pateriya, P.K., (2016). Development of IoT based smart security and monitoring devices for agriculture. In: 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence), pp. 597–602.
- 8. Bator, M., Przystasz, J., Serafin, M., (2023). Security of the DNSSEC protocol and its impact on online privacy protection. Advances in Web Development Journal, 1(1), 20.
- 9. Bautista, C., Mester, G., (2023). Internet of Things in Self-driving Cars Environment. Interdisciplinary Description of Complex Systems: INDECS, 21(2), 188–198.
- 10. Bogue, R., (2012). Solar-powered sensors: a review of products and applications. Sensor Review, 32(2), 95–100.
- 11. Bontchev, V., (1998). Macro virus identification problems. Computers & Security, 17(1), 69–89.
- 12. Boteanu, A., Răstoceanu, F., Rădoi, I., Rusea, C., (2019, October). Modeling and simulation of electromagnetic shielding for IoT sensor nodes case. In: 2019 International Conference on Speech Technology and Human-Computer Dialogue (SpeD), pp. 1–6.
- 13. Cantrell, K., (2022, September 15). Half of the malware detected in 2019 was classified as zero-day threats, making it the most common malware to date. https://www.cynet.com/blog/half-of-the-malware-detected-in-2019-was-classified-as-zero-day-threatsmaking-it-the-most-common-malware-to-date/.
- 14. Case, D.U., (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388(1-29), 3.
- 15. Cekerevac, Z., Dvorak, Z., Prigoda, L., Cekerevac, P., (2017). Internet of things and the man-in-the-middle attacks–security and economic risks. MEST Journal, 5(2), 15–25.
- 16. Cheerag, K., Sindhwani, N., Chaudhary, A., (2022). Analysing the Impact of Cyber-Threat to ICS and SCADA Systems. International Mobile and Embedded
- Technology Conference (MECON), Noida, India, pp. 466–470. doi:10.1109/MECON53876.2022.9752425
- 17. Chen, D., Cong, J., Gurumani, S., Hwu, W. M., Rupnow, K., Zhang, Z., (2016). Platform choices and design demands for IoT platforms: cost, power, and performance tradeoffs. IET Cyber‐Physical Systems: Theory & Applications, 1(1), 70–77.
- 18. Chen, L.C., & Carley, K.M., (2004). The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 34(2), 823–833.
- 19. Choo, K.K.R., (2007). Zombies and botnets. Trends & issues in crime and criminal justice, no. 333. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/tandi/tandi333.
- 20. Cohen, G., (2019). Downtime, outages and failures – understanding their true costs. https://www.evolven.com/blog/downtime-outages-and-failures-understandingtheir-true-costs.html.
- 21. Comparitech (2023). Malware statistics in 2023: Frequency, impact, cost & more. https://www.comparitech.com/antivirus/malware-statistics-facts/.
- 22. Da Silva Cardoso, A.M., Lopes, R.F., Teles, A.S., Magalhães, F.B.V., (2018, April). Real--time DDoS detection based on complex event processing for IoT. In: 2018 IEEE/
- ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 273–274.
- 23. DaCosta, F., & Henderson, B., (2013). Rethinking the Internet of Things: a scalable approach to connecting everything, Springer Nature, p. 192.
- 24. Davcev, D., Mitreski, K., Trajkovic, S., Nikolovski, V., Koteli, N., (2018, June). IoT agriculture system based on LoRaWAN. In: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1–4.
- 25. De Felice, F., Petrillo, A., (2018). Human factors and reliability engineering for safety and security in critical infrastructures. Decision Making, Theory, and Practice. Springer, Cham.
- 26. Denning, P.J., (1988). Computer viruses. No. NASA-CR-184680.
- 27. Dittrich, D., (1999). The DoS Project’s ‘trinoo’ distributed denial of service attack tool. University of Washington, 10.
- 28. Dul, M., Gugała Ł., Łaba K., (2023). Protecting web applications from authentication attacks. Advances in Web Development Journal, 1(1).
- 29. Dusane, P.S., Pavithra, Y., (2020). Logic Bomb: An Insider Attack. International Journal, 9(3).
- 30. Gama, E.S., de Araujo, L., Immich, R., Bittencourt, L.F., (2021). Video Streaming Analysis in Multi-tier Edge-Cloud Networks. In: 8th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, pp. 19–25. doi: 10.1109/FICLOUD49777.2021.00011
- 31. El-Sayed, H., Sankar, S., Prasad, M., Puthal, D., Gupta, A., Mohanty, M., & Lin, C.T., (2017). Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access, 6, 1706–1717.
- 32. Far, S.B., Rad, A.I., Bamakan, S.M.H., & Asaar, M.R., (2023). Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/ virtual communications. Journal of Network and Computer Applications, 103675. DOI:10.1016/j.jnca.2023.103675
- 33. Gamil, Y.A., Abdullah, M., Abd Rahman, I., Asad, M.M., (2020). Internet of things in construction industry revolution 4.0: Recent trends and challenges in the Malaysian context. Journal of Engineering, Design and Technology, 18(5), 1091–1102.
- 34. Gao, J., Li, L., Kong, P., Bissyandé, T.F., & Klein, J., (2019). Should you consider adware as malware in your study?. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 604–608.
- 35. Ghosh, J., (2020). Corporate networking with advance routing, switching and security. In: 2020 IEEE 1st International Conference for Convergence in Engineering (ICCE), pp. 311–314.
- 36. Ghosh, R.K., Banerjee, A., Aich, P., Basu, D., Ghosh, U., (2022). Intelligent IoT for Automotive Industry 4.0: Challenges, Opportunities, and Future Trends. In: Intelligent Internet of Things for Healthcare and Industry, 327–352.
- 37. Gołębiowska, A., Such-Pyrgiel, M., Prokopowicz, D., (2022). Post-pandemic reality and the security of ict, big data, industry 4.0, social media portals and the internet. Journal of Modern Science, 49(2).
- 38. Gunge, V.S., Yalagi, P.S., (2016). Smart home automation: a literature review. International Journal of Computer Applications, 975(8887–8891).
- 39. Gupta, S., Cherukuri, A.K., Subramanian, C.M., Ahmad, A., (2022). Comparison, analysis and analogy of biological and computer viruses. In: Intelligent Interactive Multimedia Systems for e-Healthcare Applications, 3–34.
- 40. Gomez, J.E., Marcillo, F.R., Triana, F.L., Gallo, V.T., Oviedo, B.W., Hernandez, V.L., (2017). IoT for environmental variables in urban areas. Procedia Computer Science, 109, 67–74.
- 41. Herzberg, A., Kfir, Y., (2019). The leaky actuator: A provably-covert channel in cyber physical systems. In: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, pp. 87–98.
- 42. Hughes, L.E., (2022). The Depletion of the IPv4 Address Space. In: Third Generation Internet Revealed: Reinventing Computer Networks with IPv6, pp. 119–146.
- 43. Humaira, F., Islam, M.S., Luva, S.A., Rahman, M.B., (2020). A Secure Framework for IoT Smart Home by Resolving Session Hijacking. Glob. J. Comput. Sci. Technol, 20(2), 9–20.
- 44. Husamuddin, M., Qayyum, M., (2017). Internet of Things: A study on security and privacy threats. In: 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), pp. 93–97.
- 45. ISO 690.
- 46. ISO 690.
- 47. Jaakkola, H., Henno, J., Makela, J., (2023). Computers in Education. doi: 10.23919/ MIPRO57284.2023.10159980
- 48. Jakubczak, W., (2022). Globalna skala wykorzystania działań hybrydowych przez federację rosyjską. Zeszyty Naukowe Pro Publico Bono, 1 (1): 83–105. DOI: 10.5604/ 01.3001.0016.1962
- 49. Jhi, Y.C., Liu, P., Li, L., Gu, Q., Jing, J., Kesidis, G., (2010). PWC: A proactive worm containment solution for enterprise networks. Security and Communication Networks, 3(4), 334–354.
- 50. Khanboubi, F., Boulmakoul, A., Tabaa, M., (2019). Impact of digital trends using IoT on banking processes. Procedia Computer Science, 151, 77–84.
- 51. Kim, S., Park, J., Lee, K., You, I., Yim, K., (2012). A Brief Survey on Rootkit Techniques in Malicious Codes. J. Internet Serv. Inf. Secur., 2(3/4), 134–147.
- 52. Krupanek, B., Bogacz, R., (2018). Węzły końcowe systemow Internetu Rzeczy. Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej, 59, 111–116.
- 53. Krysiński, M., (2016). Internet rzeczy – innowacyjne narzędzie dla firm. Ekonomiczne Problemy Usług, 122(1), 279–288.
- 54. Kumari, P., Jain, A.K., (2023). A comprehensive study of DDoS attacks over IoT network and their countermeasures. Computers & Security, 127, 103096.
- 55. Kuraś, P., Organiściak, P., Kowal, B., & Łukasik, E., (2023). Using machine learning techniques to reduce pairwise comparison matrix inconsistencies. In: Šperka, R., Suchanek, P., Duhaček Šebestova, J., Dolak, R. et al. (eds.). 4th International conference on Decision making for Small and Medium-Sized Enterprises. Conference Proceedings. Karvina: Silesian University in Opava, School of Business Administration in Karvina, pp. 122–131.
- 56. Kwiatkowska, E.M., (2016). Internet rzeczy. Czy będą nas leczyć komputery? Internetowy Kwartalnik Antymonopolowy i Regulacyjny (iKAR), 5(6), 19–32.
- 57. Lee, W.S., Alchanatis, V., Yang, C., Hirafuji, M., Moshou, D., Li, C., (2010). Sensing technologies for precision specialty crop production. Computers and electronics in agriculture, 74(1), 2–33.
- 58. Li, S., Xu, L. D., Zhao, S. (2015). The internet of things: a survey. Information systems frontiers, 17, 243–259.
- 59. Liao, C.H., Shuai, H.H., Wang, L.C., (2018). Eavesdropping prevention for heterogeneous Internet of Things systems. In: 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–2.
- 60. Lukiv, J., (2022). Ukraine War: Power and water supply hit across Ukraine in “massive” Russian missile strikes. https://www.bbc.com/news/world-europe-63454230.
- 61. Makhshari, A., Mesbah, A., (2021). IoT bugs and development challenges. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) (pp. 460–472).
- 62. Marzano, L., Hollis, C., Cipriani, A., Malhi, G.S., (2017). Digital technology: coming of age?. Evidence-based Mental Health, 20, 97. doi: 10.1136/EB-2017-102821
- 63. Matejkowski, D., Szmyd, P., (2023). Online identity theft detection and prevention methods. Advances in Web Development Journal, 1(1), 12.
- 64. Michael, M., (2019). Attack Landscape H2 2018: Attack traffic increases fourfold – Fsecure blog, https://blog.f-secure.com/attack-landscape-h2-2018/.
- 65. Miller, C., (2008). Virtual worlds, real exploits. Network Security, 2008(4), 4–6.
- 66. Milosevic, J., Sklavos, N., Koutsikou, K., (2016). Malware in IoT software and hardware. In: Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE’16), Barcelona, Spain.
- 67. Mogili, UR., Deepak, BB.V.L., (2018). Review on application of drone systems in precision agriculture. Procedia Computer Science, 133, 502–509.
- 68. Moran, S., (2012). The basics of electric weapons and pulsed-power technologies. Leading Edge, 7(4), 50.
- 69. Mukhopadhyay, S.C., Suryadevara, N.K., (2014). Internet of things: Challenges and opportunities. Springer International Publishing, pp. 1–17.
- 70. Nagpal, B., Sharma, P., Chauhan, N., Panesar, A., (2015, March). DDoS tools: Classification, analysis and comparison. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 342–346.
- 71. Nakalembe, C., Becker-Reshef, I., Bonifacio, R., Hu, G., Humber, M.L., Justice, C.J., ... & Sanchez, A., (2021). A review of satellite-based global agricultural monitoring systems available for Africa. Global Food Security, 29, 100543.
- 72. Oostenbrink, J., (2015). Financial impact of downtime decrease and performance increase of IT services. Bachelor’s thesis. University of Twente.
- 73. Paidant. (2023). The Tech Talent Shortage: Navigating the challenges and solutions. https://www.linkedin.com/pulse/tech-talent-shortage-navigating-challenges-solutions-paidant/.
- 74. Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L., (2004). Characteristics of internet background radiation. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 27–40.
- 75. Parpala, R.C., Iacob, R., (2017). Application of IoT concept on predictive maintenance of industrial equipment. In: MATEC Web of Conferences, Vol. 121.
- 76. Pawłowicz, B., Salach, M., Trybus, B., (2019). Smart city traffic monitoring system based on 5G cellular network, RFID and machine learning. In: Engineering Software Systems: Research and Praxis, pp. 151–165.
- 77. Pawłowicz, B., Salach, M., Trybus, B., (2019, February). Infrastructure of RFID-based smart city traffic control system. In Conference on Automation. Cham: Springer International Publishing, pp. 186–198.
- 78. Petrosyan, A., (2023). Malware: Most common attack types 2021. https://www.statista.com/statistics/271037/distribution-of-most-common-malware-file-types/.
- 79. Pietrek, G.W., Skelnik, K., (2023). Cybersecurity and the scope of designing information security systems in the organization. Journal of Modern Science, 51(2), 141–173. https://doi.org/10.13166/jms/166583
- 80. Pratheesh Kumar, S., Dinesh, R., Raja, V., & Karthikeyan, S., (2022). Study and Development of Remote Control Appliances in DailyLife. In: Materials, Design and Manufacturing for Sustainable Environment: Select Proceedings of ICMDMSE 2022. Singapore: Springer Nature Singapore, pp. 205–219.
- 81. Protasowicki, I., (2018). Wpływ zagrożenia atakami DoS/DDoS na bezpieczeństwo teleinformatycznej infrastruktury krytycznej. Modern Management Review, vol. XXIII, 25 (1/2018), pp. 131–139.
- 82. Rad, B.B., Masrom, M., Ibrahim, S., (2012). Opcodes histogram for classifying metamorphic portable executables malware. In: 2012 International Conference on e-Learning and e-Technologies in Education (ICEEE), pp. 209–213.
- 83. Rathee, G., Garg, S., Kaddoum, G., Choi, B.J., (2020). Decision-making model for securing IoT devices in smart industries. IEEE Transactions on Industrial Informatics, 17(6), 4270–4278.
- 84. Rayes, A., Salam, S., (2022). The things in IoT: Sensors and actuators. In: Internet of Things from Hype to Reality: The Road to Digitization. Cham: Springer International Publishing, pp. 63–82.
- 85. Rosas, J.A.D., Brito, V., Brito Palma, L., Barata, J., (2017). Approach to adapt a legacy manufacturing system into the IoT paradigm. International Journal of Interactive Mobile Technologies (iJIM), 11(5).
- 86. Rossow, C., Dietrich, C., Bos, H., (2013). Large-scale analysis of malware downloaders. In: Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26–27, 2012, Revised Selected Papers 9. Springer Berlin Heidelberg, pp. 42–61.
- 87. Rysz, S. J., (2020). Security of personal data. Part I – The specificity of determinants of personal identity in the 21st century. Zeszyty Naukowe SGSP, 75, 223–237.
- 88. Sanchez-Sutil, F., Cano-Ortega, A., (2021). Smart regulation and efficiency energy system for street lighting with LoRa LPWAN. Sustainable Cities and Society, 70, 102912.
- 89. Sangeethalakshmi, K., Preethi, U., Pavithra, S., (2023). Patient health monitoring system using IoT. Materials Today: Proceedings, 80, 2228–2231.
- 90. Serazzi, G., Zanero, S., (2003). Computer virus propagation models. In: International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 26-50.
- 91. Shen, W., Wu, Q., (2011). Exploring redundancy in sensor deployment to maximize network lifetime and coverage. In: 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 557–565.
- 92. Sim, G., (2018). Defending against the malware flood. Network Security, (5), 12–13.
- 93. Singh, A., Choudhary, P., (2021). Keylogger detection and prevention. Journal of Physics: Conference Series, Vol. 2007, No. 1, p. 012005).
- 94. Singh, R.K., Aernouts, M., De Meyer, M., Weyn, M., Berkvens, R., (2020). Leveraging LoRaWAN technology for precision agriculture in greenhouses. Sensors, 20(7), 1827.
- 95. Słota-Bohosiewicz, A., (2019). Wpływ Internetu rzeczy na bezpieczeństwo człowieka. Journal of Modern Science, 41(2), 189–208. https://doi.org/10.13166/jms/111177
- 96. Smith, A.D., (2004). Strategic leveraging of videoconferencing and web-enabled conferencing in an information-rich environment. International Journal of Services and Standards, 1(2), 206-227.
- 97. Smith, C., Matrawy, A., Chow, S., Abdelaziz, B., (2009). Computer worms: Architectures, evasion strategies, and detection mechanisms. Journal of Information Assurance and Security, 4, 69–83.
- 98. Song, J., Shimamura, J., Eto, M., Inoue, D., Nakao, K., (2011). Correlation analysis between spamming botnets and malware infected hosts. In: 2011 IEEE/IPSJ International Symposium on Applications and the Internet, pp. 372–375.
- 99. Stoll, M., Breu, R., (2012). Information security measurement roles and responsibilities. In: Emerging trends in computing, informatics, systems sciences, and engineering. New York: Springer New York, pp. 11–23.
- 100. Stočes, M., Vaněk, J., Masner, J., Pavlík, J., (2016). Internet of things (IoT) in agriculture- selected aspects. Agris on-line Papers in Economics and Informatics, 8(1), 83–88.
- 101. Strzałka, D., Gerka, A., Kowal, B., Kuraś, P., Leopold, G., Lewicz, M., Jaworski, D., (2021), The Support System for Anomaly Detection with Application in Mainframe Management Process. Modern Management Based on Big Data II and Machine Learning and Intelligent Sys[tems III: Proceedings of MMBD 2021 and MLIS 2021, 341, 96.
- 102. Synowiec, A., (2019). Wykorzystanie Internetu rzeczy w zarządzaniu inteligentnym miastem. Zeszyty Naukowe Politechniki Częstochowskiej. Zarządzanie, 34, 155–166.
- 103. Szabłowski, S., (2023). Aspekty dydaktyczne internetu rzeczy. Dydaktyka Informatyki, vol.. 18 (2023), pp. 176–184.
- 104. Szappanos, G., (2002). Are there any polymorphic macro viruses at all? (… and what to do with them). In: Proceedings of the 12th International Virus Bulletin Conference.
- 105. Szozda, N., (2017). Znaczenie Internetu rzeczy w planowaniu przepływów produktów i informacji w łańcuchu dostaw. Studia Ekonomiczne. Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach, (315).
- 106. Szubrycht, T., Szymański, T., (2005). Broń elektromagnetyczna jako nowy środek walki w erze informacyjnej. Zeszyty Naukowe Akademii Marynarki Wojennej, 46,3 (162), 121–134.
- 107. Szykuła-Piec, B., Piec, R., (2020). Costs of Security Understood as a Service Product Abstract. Zeszyty Naukowe SGSP, Special Issue (1), 159–170.
- 108. Świętochowski, N., (2018). The History and Use of Electromagnetic Weapons. Historia i Polityka, 33(26), 123–136.
- 109. Takiddeen, N., & Zualkernan, I., (2019, June). Smartwatches as IoT edge devices: A framework and survey. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 216–222.
- 110. Tchuitcheu, W.C., Bobda, C., Pantho, M.J.H., (2020). Internet of smart-cameras for traffic lights optimization in smart cities. Internet of Things, 11, 100207.
- 111. Thakur, K., Ali, M.L., Jiang, N., Qiu, M., (2016). Impact of cyber-attacks on critical infrastructure. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud
- (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 183–186.
- 112. Tudosi, A.D., Graur, A., Balan, D.G., Potorac, A.D., (2023). Research on Security Weakness Using Penetration Testing in a Distributed Firewall. Sensors, 23(5), 2683.
- 113. Umair, M., Cheema, M.A., Cheema, O., Li, H., Lu, H., (2021). Impact of COVID-19 on IoT adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT. Sensors, 21(11), 3838.
- 114. Walczak, D., Wrzos, M., Radziuk, A., Lewandowski, B., Mazurek, C., (2012). Machineto- Machine communication and data processing approach in Future Internet applications. In: 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), pp. 1–5.
- 115. Wangen, G., (2015). The role of malware in reported cyber espionage: a review of the impact and mechanism. Information, 6(2), 183–211.
- 116. Wiercioch, K., (2022). Wojna informacyjna jako element wojny hybrydowej. Bachelor thesis: Cracow: Jagiellonian University.
- 117. Wojciechowska, K., (2022). Jak wygląda internet po 30 Latach w Polsce? https://isportal.pl/jak-wyglada-internet-po-30-latach-w-polsce/.
- 118. Yu, D., Zhang, L., Chen, Y., Ma, Y., Chen, J., (2020). Large-scale IoT devices firmware identification based on weak password. IEEE Access, 8, 7981–7992.
- 119. Zaddach, J., Kurmus, A., Balzarotti, D., Blass, E.O., Francillon, A., Goodspeed, T., ... & Koltsidas, I., (2013). Implementation and implications of a stealth hard-drive backdoor. In: Proceedings of the 29th annual computer security applications conference, pp. 279–288.
- 120. Zhang, Y., & Paxson, V., (2000). Detecting backdoors. In: 9th USENIX Security Symposium (USENIX Security 00).
- 121. Zhang, Y., Chen, Q., Liu, G., Shen, W., Wang, G., (2016). Environment parameters control based on wireless sensor network in livestock buildings. International Journal of Distributed Sensor Networks, 12(5), 9079748.
- 122. Zhu, B., Joseph, A., & Sastry, S., (2011). A taxonomy of cyber attacks on SCADA systems. In: 2011 International conference on internet of things and 4th international conference on cyber, physical and social computing, pp. 380–388.
- 123. Zieliński, A., (2018). Cyberbezpieczeństwo-problem globalny. Przegląd Telekomunikacyjny – Wiadomości Telekomunikacyjne, 10, 864–869.
- 124. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H.N., (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4a61751e-156d-4cda-9751-257740c3890e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.