Эта статья является препринтом и не была отрецензирована.
О результатах, изложенных в препринтах, не следует сообщать в СМИ как о проверенной информации.
Архитектурные уязвимости IoT-устройств в контексте атак по сторонним каналам
1. Internet of things (IoT) security dataset evolution: Challenges and future directions / Kaur, Barjinder, et al. // Internet of Things 22 (2023): 100780
2. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices / Meneghello, Francesca, et al. // IEEE Internet of Things Journal 6.5 (2019): 8182-8201
3. IoT‐based applications in healthcare devices / Pradhan, Bikash, Saugat Bhattacharyya, and Kunal Pal // Journal of healthcare engineering 2021.1 (2021): 6632599
4. Internet of things (iot): growth, challenges, and security / Kizza, Joseph Migga // Guide to computer network security. Cham: Springer International Publishing, 2024. pp. 557-573
5. Predictors of complications and mortality among patients undergoing pacemaker implantation in resource-limited settings: a 10-year retrospective follow-up study / Nasir, M., Dejene, K., Bedru, M. et al. // BMC Cardiovasc Disord 24, 400 (2024)
6. A review of Internet of Things for smart home: Challenges and solutions / Stojkoska, Biljana L. Risteska, and Kire V. Trivodaliev // Journal of cleaner production 140 (2017): 1454-1464
7. Introduction to side-channel attacks / Standaert, François-Xavier // Secure integrated circuits and systems (2010): 27-42
8. Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities / D. Rupanetti and N. Kaabouch // Appl. Sci. 2024, 14(16), 7104
9. Information sharing as strategic behaviour: The role of information display social motivation and time pressure / N. Bălău and S. Utz // Behav. Inf. Technol., vol. 36, no. 6, pp. 589-605, Dec. 2017
10. Side-channel attacks on mobile and IoT devices for Cyber–Physical systems / M.Conti, E. Losiouk, R.Poovendran, R. Spolaor // 15 Feb. 2022, Version of Record 23 Feb. 2022
11. Differential power analysis / P. Kocher, J. Jaffe and B. Jun // Advances in Cryptology, Berlin, Germany:Springer, pp. 388-397, 1999
12. Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets / A. Sayakkara and N. Le-Khac // August 2021 IEEE Access PP(99):1-1
13. Internet of things 2.0: Concepts applications and future directions / I. Zhou, I. Makhdoom, N. Shariati, M. A. Raza, R. Keshavarz, J. Lipman, et al. // IEEE Access, vol. 9, pp. 70961-71012, 2021
14. Security of IoT systems: Design challenges and opportunities / Xu, Teng, James B. Wendt, and Miodrag Potkonjak // IEEE/ACM International Conference on Computer-Aided Design (ICCAD), IEEE, 2014
15. Security analysis on consumer and industrial IoT devices / Wurm, Jacob, et al. // 21st Asia and South Pacific design automation conference (ASP-DAC), IEEE, 2016