Tactical Approach to Cyber Defence in IoT Computer Networks
Source:Information & Security: An International Journal,
Keywords:architecture, authentication, Internet of Things, security, Vulnerabilities
Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.