4,392 Hits in 3.4 sec

Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management [article]

Markus Miettinen and Paul C. van Oorschot and Ahmad-Reza Sadeghi
2018 arXiv   pre-print
The emerging Internet of Things (IoT) drastically increases the number of connected devices in homes, workplaces and smart city infrastructures.  ...  The need to support device on-boarding, ongoing device management and control, and secure decommissioning dictates a suite of key management services for both access control to devices, and access by devices  ...  The building of IoT devices into infrastructures is referred to as smart city or smart building scenarios.  ... 
arXiv:1808.03071v1 fatcat:27f3ctqkejgvfbthxkxfyp7pme

Thesis Deployment Optimization of IoT Devices through Attack Graph Analysis [article]

Noga Agmon
2019 arXiv   pre-print
The results demonstrate (1) the contribution of the augmented attack graphs to quantifying the impact of IoT devices deployed within the organization on security, and (2) the effectiveness of the optimized  ...  In this work, we quantify the level of network security based on an augmented attack graph analysis that accounts for the physical location of IoT devices and their communication capabilities.  ...  In the case of the hacked smart light bulbs for example, there was no need for so many brightness levels. Finally, it's important to consider how to integrate the IoT devices.  ... 
arXiv:1911.06811v1 fatcat:ymslarllardz5esh2alnp6knfm

Handling a trillion (unfixable) flaws on a billion devices

Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, Chenren Xu
2015 Proceedings of the 14th ACM Workshop on Hot Topics in Networks - HotNets-XIV  
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with estimates of over 25 billion devices deployed by 2020.  ...  However, the scale, diversity, cyberphysical coupling, and cross-device use cases inherent to IoT require us to rethink network security along three key dimensions: (1) abstractions for security policies  ...  Next, we discuss the potential of extending SDN and NFV to secure IoT devices, identifying key challenges.  ... 
doi:10.1145/2834050.2834095 dblp:conf/hotnets/YuSSAX15 fatcat:56gb3q4jk5fw5f5tv32e7gwddu

Device-to-Device Communications for 5G Internet of Things

L. Militano, G. Araniti, M. Condoluci, I. Farris, A. Iera
2015 EAI Endorsed Transactions on Internet of Things  
The proliferation of heterogeneous devices connected through large-scale networks is a clear sign that the vision of the Internet of Things (IoT) is getting closer to becoming a reality.  ...  State-of-the-art solutions, enabling radio technologies, and current standardization activities for D2D communications are surveyed and their pros and cons with reference to manifold IoT use cases pointed  ...  At the same time, automated IoT systems may have advantages in triggering simultaneous actions on multiple devices (such as, for example, street light lamps) in a smart city.  ... 
doi:10.4108/eai.26-10-2015.150598 fatcat:ulueehvhqndtjjfxj44ec26cca

Deployment optimization of IoT devices through attack graph analysis

Noga Agmon, Asaf Shabtai, Rami Puzis
2019 Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19  
The results demonstrate (1) the contribution of the augmented attack graphs to quantifying the impact of IoT devices deployed within the organization on security, and (2) the effectiveness of the optimized  ...  In this paper, we quantify the level of network security based on an augmented attack graph analysis that accounts for the physical location of IoT devices and their communication capabilities.  ...  The authors noted that the lighting hub can consist of any other smart hub, and the scenario can also be used to hack into any smart device, not only light bulbs. Yigit et al.  ... 
doi:10.1145/3317549.3323411 dblp:conf/wisec/AgmonSP19 fatcat:4np5gy7cbvcw5gh3y66jspbufi

Smartphone: The Ultimate IoT and IoE Device [chapter]

Mehdia Ajana El Khaddar, Mohammed Boulmalf
2017 Smartphones from an Applied Research Perspective  
We also provide a concise overview of future opportunities and challenges in IoT and IoE environments and focus more on the security and privacy threats of using the smartphone in IoT and IoE networks  ...  In this chapter, we provide a comprehensive survey on IoT and IoE technologies, their application domains, IoT structure and architecture, the use of smartphones in IoT and IoE, and the difference between  ...  The five categories of attacks stated above have different effects on the smartphones as major IoT devices, for example, a Denial of Service attack of a smartphone will affect the IoT and the cellular  ... 
doi:10.5772/intechopen.69734 fatcat:jft5szpcqfggzhh4r5icjgwdbq

Securing Smart Home Edge Devices against Compromised Cloud Servers [article]

Rahmadi Trimananda, Ali Younis, Thomas Kwa, Brian Demsky, Harry Xu
2020 arXiv   pre-print
Although there exists a body of work on IoT security, most of it focuses on securing clients (i.e., IoT devices). However, cloud servers can also be compromised.  ...  Smart home IoT systems often rely on cloud-based servers for communication between components.  ...  Threat Model FIDELIUS focuses on preventing attackers from using compromised servers to mount large scale attacks on smart home devices.  ... 
arXiv:2006.11657v2 fatcat:p2xb5u3h4jbz3khnb6zwtevc3m

Deep Adversarial Learning on Google Home devices [article]

Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione
2021 arXiv   pre-print
Smart speakers and voice-based virtual assistants are core components for the success of the IoT paradigm.  ...  This letter showcases the inadequacy of such countermeasures against machine learning attacks with a dedicated experimental campaign on a real network dataset.  ...  The only notable exception is [9] , which proposes a padding scheme to protect IoT and smart devices from statistical analysis.  ... 
arXiv:2102.13023v1 fatcat:yi3noammfreyjgs5gm5itp3kee

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes [chapter]

Andy Dolan, Indrakshi Ray, Suryadipta Majumdar
2020 Lecture Notes in Computer Science  
Internet of Things (IoT) device adoption is on the rise. Such devices are mostly self-operated and require minimum user interventions.  ...  We apply our approach to the context of a smart home and evaluate its accuracy and efficiency on the devices from three different vendors.  ...  The authors thank the anonymous reviewers for their comments.  ... 
doi:10.1007/978-3-030-49669-2_3 fatcat:ofocp4xrejexthvni5wyblml4m

A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – An Initial Prototype

K. A. Rafidha Rehiman, S. Veni
2016 Indian Journal of Science and Technology  
IoT facilitated the interaction of human with anyone over the world with a smart sensor device.  ...  Each participant autonomously interacting and communicating via internet and no centralized authority is there to control the objects 2 . Figure 1 depicts the Internet of Things in Smart Environment.  ...  The lack of implementation of lightweight authentication mechanism is concentrated on this research and proposes a new light weight method for trust management specifically for smart mobile devices.  ... 
doi:10.17485/ijst/2016/v9i9/86791 fatcat:b4zqqny73fh6lceqwrq73bz24u

Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps [article]

Davino Mauro Junior, Luis Melo, Harvey Lu, Marcelo d'Amorim, Atul Prakash
2019 arXiv   pre-print
Assessing the vulnerability of IoT devices is an important problem, but analyzing their firmware is difficult for a variety of reasons, including requiring the purchase of devices.  ...  A key finding of this study is that the communication between an IoT device and its app is often not properly encrypted and authenticated and these issues enable the construction of exploits to remotely  ...  We provide detailed evidence of the importance of our findings by building proof-of-concept attacks on randomly selected, from a list of popular IoT devices on Amazon, five IoT devices.  ... 
arXiv:1901.10062v1 fatcat:iu4exmzbs5a6ljzsetukxaiwfe

Network-level security and privacy control for smart-home IoT devices

Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, Olivier Mehani
2015 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)  
We then argue that as more such devices emerge, the attack vectors increase, and ensuring privacy/security of the house becomes more challenging.  ...  We further propose that software defined networking technology be used to dynamically block/quarantine devices, based on their network activity and on the context within the house such as time-of-day or  ...  As we have shown in the previous section, this is not the case -indeed many of these devices can be compromised with very little effort on the part of the attacker.  ... 
doi:10.1109/wimob.2015.7347956 dblp:conf/wimob/SivaramanGVBM15 fatcat:3wj52vkzsngatjwnaqv3yda46q

Narrowband-Internet of Things Device-to-Device Simulation: An Open-Sourced Framework

Ohood Saud Althobaiti, Mischa Dohler
2021 Sensors  
, and the prevention of attacks from malicious nodes.  ...  The devices' development and integration into different smart systems require permanent control, supervision, and the study of power consumption models to determine the performance of the network topology  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21051824 pmid:33807859 fatcat:kvojow7sendm7d6gst7s2txryi

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms [article]

Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang
2019 arXiv   pre-print
A smart home connects tens of home devices to the Internet, where an IoT cloud runs various home automation applications.  ...  By instructing the phantom devices to intervene in the normal entity-entity interactions, we have discovered several new vulnerabilities and a spectrum of attacks against real-world smart home platforms  ...  DISCUSSION In this section, we first discuss broader impact of this work from two aspects -how to extend the general idea of the proposed attacks to other types of smart devices, and how commercial companies  ... 
arXiv:1811.03241v2 fatcat:l62uo5jc4ncmznhfiloijwx2e4

A decentralized approach towards secure firmware updates and testing over commercial IoT Devices [article]

Projjal Gupta
2020 arXiv   pre-print
Internet technologies have made a paradigm shift in the fields of computing and data science and one such paradigm defining change is the Internet of Things or IoT.  ...  The update process of these IoT devices usually lack the ability of checking the security of centralized servers, which may be compromised and host malicious firmware files as it is presumed that the servers  ...  IoT devices are designed on the basis of use-case, durability, deployment constraints and various other properties, due to which there can't be any one OTA architecture agnostic for all devices.  ... 
arXiv:2011.12052v1 fatcat:fkqke4eb2bettfyq4hwoxrifxq
« Previous Showing results 1 — 15 out of 4,392 results