Have a personal or library account? Click to login
Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System Cover

Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System

Open Access
|Oct 2022

References

  1. [1] S. Baraković, et al.: Quality of Life Framework for Personalised Ageing: A Systematic Review of ICT Solutions, Electronics, 17, 2940, 202010.3390/ijerph17082940721599232344521
  2. [2] A.L. Bleda, et al.: AmiCare: Ambient Intelligent and Assistive System for Caregivers Support, 16th International Conference on Embedded and Ubiquitous Computing, 201810.1109/EUC.2018.00017
  3. [3] J. Kulović, S. Baraković, J. Baraković Husić: Analysis of Threats for Web of Things (WoT) System, Bosanskohercegovačka elektrotehnika, 14:19-26, 202010.2478/bhee-2020-0009
  4. [4] A. Hajrić, T. Smaka, S. Baraković, J. Baraković Husić: Methods, Methodologies, and Tools for Threat Modeling with Case Study, Telfor Journal, 12(1): 56-61, 202010.5937/telfor2001056H
  5. [5] J.D. Meier, A. Mackman, B. Wastell: Threat Modeling Web Applications, Microsoft Corporation, 2005, Available at: https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff648006(v=pandp.10)?redirectedfrom=MSDN.
  6. [6] A. Shostack: Threat Modeling: Designing for Security, John Wiley & Sons, Inc., 2014
  7. [7] T. Agarwal: Wireless Sensor Network Architecture and Its Applications, ELPROCUS, 2016, Available at: https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/.
  8. [8] L. Banjanović-Mehmedović: Bežične senzorske mreže, University in Tuzla, 2009
  9. [9] M. Angel, E. Villegas, S. Y. Tang, Y. Qian: Wireless Sensor Network Communication Architecture for Wide-Area Large Scale Soil Moisture Estimation and Wetlands Monitoring, WALSAIP Research Project, Technical Report TR-NCIG-0501
  10. [10] B. Radenković, et al.: Internet inteligentnih uređaja, University of Belgrade, 2017
  11. [11] Silicon Laboratories: The Evolution of Wireless Sensor Networks, Report, 2013
  12. [12] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732
  13. [13] J. Fruhlinger: Threat Modeling Explained: A Process for Anticipating Cyber Attacks, 2020. Available at: https://www.csoonline.com/article/3537370/threat-modeling-explained-a-process-for-anticipating-cyber-attacks.html.
  14. [14] Centar informacijske sigurnosti (CIS): Modeliranje sigurnosnih prijetnji (Threat modeling), 2012, Available at: https://www.cis.hr/files/dokumenti/CIS-DOC-2012-05-049.pdf.
  15. [15] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threat-modeling.
  16. [16] T. Dervišević, S. Baraković, J. Baraković Husić: Case Study: Security of System for Remote Management of Windows, Bosanskohercegovačka elektrotehnika, 14: 4-11, 202010.2478/bhee-2020-0007
  17. [17] H. Mahmood: Application Threat Modeling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/.
  18. [18] N. Shevchenko: Threat Modeling: 12 Available Methods, 2018. Available at: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/.
  19. [19] M. Abomhara, G.M. Goein, M. Gerdes: A STRIDE-Based Threat Model for Telehealth Systems, Norsk Informasjonssikkerhetskonferanse (NISK), 2015
DOI: https://doi.org/10.2478/bhee-2021-0015 | Journal eISSN: 2566-3151 | Journal ISSN: 2566-3143
Language: English
Page range: 31 - 39
Submitted on: Sep 1, 2021
Accepted on: Oct 1, 2021
Published on: Oct 26, 2022
Published by: Bosnia and Herzegovina National Committee CIGRÉ
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2022 Nejla Popaja, Sabina Baraković, Jasmina Baraković Husić, published by Bosnia and Herzegovina National Committee CIGRÉ
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.