Next Article in Journal
Methods and Experiments for Sensing Variations in Solar Activity and Defining Their Impact on Heart Variability
Next Article in Special Issue
Status Estimation and In-Process Connection of Kanbans Using BLE Beacons and LPWA Network to Implement Intra-Traceability for the Kanban System
Previous Article in Journal
Rapid and Sensitive Inhibitor Screening Using Magnetically Modulated Biosensors
Previous Article in Special Issue
A Secure and Scalable Smart Home Gateway to Bridge Technology Fragmentation
Article

Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach

1
Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan
2
Consiglio Nazionale delle Ricerche (CNR), IEIIT Institute, 16149 Genoa, Italy
3
Department of Computer Science, National University of Computer and Emerging Sciences, Lahore 54000, Pakistan
*
Authors to whom correspondence should be addressed.
Academic Editors: Tiago M. Fernández-Caramés and Paula Fraga-Lamas
Sensors 2021, 21(14), 4816; https://doi.org/10.3390/s21144816
Received: 27 May 2021 / Revised: 29 June 2021 / Accepted: 9 July 2021 / Published: 14 July 2021
(This article belongs to the Special Issue Internet of Things for Smart Homes and Industrial Application)
Internet of things (IoT) is a technology that enables our daily life objects to connect on the Internet and to send and receive data for a meaningful purpose. In recent years, IoT has led to many revolutions in almost every sector of our society. Nevertheless, security threats to IoT devices and networks are relentlessly disruptive, because of the proliferation of Internet technologies. Phishing is one of the most prevalent threats to all Internet users, in which attackers aim to fraudulently extract sensitive information of a user or system, using fictitious emails, websites, etc. With the rapid increase in IoT devices, attackers are targeting IoT devices such as security cameras, smart cars, etc., and perpetrating phishing attacks to gain control over such vulnerable devices for malicious purposes. In recent decades, such scams have been spreading, and they have become increasingly advanced over time. By following this trend, in this paper, we propose a threat modelling approach to identify and mitigate the cyber-threats that can cause phishing attacks. We considered two significant IoT use cases, i.e., smart autonomous vehicular system and smart home. The proposed work is carried out by applying the STRIDE threat modelling approach to both use cases, to disclose all the potential threats that may cause a phishing attack. The proposed threat modelling approach can support the IoT researchers, engineers, and IoT cyber-security policymakers in securing and protecting the potential threats in IoT devices and systems in the early design stages, to ensure the secure deployment of IoT devices in critical infrastructures. View Full-Text
Keywords: internet of things; mitigation; threat modeling; cyber-threats; phishing; smart autonomous vehicular system; smart home; cyber-security internet of things; mitigation; threat modeling; cyber-threats; phishing; smart autonomous vehicular system; smart home; cyber-security
Show Figures

Figure 1

MDPI and ACS Style

Abbas, S.G.; Vaccari, I.; Hussain, F.; Zahid, S.; Fayyaz, U.U.; Shah, G.A.; Bakhshi, T.; Cambiaso, E. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors 2021, 21, 4816. https://doi.org/10.3390/s21144816

AMA Style

Abbas SG, Vaccari I, Hussain F, Zahid S, Fayyaz UU, Shah GA, Bakhshi T, Cambiaso E. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors. 2021; 21(14):4816. https://doi.org/10.3390/s21144816

Chicago/Turabian Style

Abbas, Syed G., Ivan Vaccari, Faisal Hussain, Shahzaib Zahid, Ubaid U. Fayyaz, Ghalib A. Shah, Taimur Bakhshi, and Enrico Cambiaso. 2021. "Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach" Sensors 21, no. 14: 4816. https://doi.org/10.3390/s21144816

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop