Assessment and Hardening of IoT Development Boards

@inproceedings{Alfandi2019AssessmentAH,
  title={Assessment and Hardening of IoT Development Boards},
  author={Omar Alfandi and Musaab Hasan and Zayed Balbahaith},
  booktitle={WWIC},
  year={2019}
}
Internet of Things (IoT) products became recently an essential part of any home in conjunction with the great advancements in internet speeds and services. The invention of IoT based devices became an easy task that could be performed through the widely available IoT development boards. Raspberry Pi is considered one of the advanced development boards that have high hardware capabilities with a reasonable price. Unfortunately, the security aspect of such products is overlooked by the developers… 

Topics from this paper

References

SHOWING 1-10 OF 30 REFERENCES
Security and privacy on internet of things
TLDR
The privacy and security challenges in the IoT are analyzed and survey on the corresponding solutions to enhance the security of IoT architecture and protocol.
Research and implementation of access control model of internet of things
  • Wang Lei, Liutong Xu
  • Computer Science
    2016 5th International Conference on Computer Science and Network Technology (ICCSNT)
  • 2016
TLDR
This paper analyzes some popular solutions to authority management in open platform of Internet, and puts up a new access control model that can distribute permissions flexibly, which means authority manager can manage authorities pretty easily, and authorities can be allocated in a real-time, dynamic condition.
A survey of internet of things, enabling technologies and protocols
TLDR
The different technologies that enable the smart objects to be come a part of the IoT network and the different protocols that have been proposed from time to time are studied.
A ZigBee honeypot to assess IoT cyberattack behaviour
Wireless Personal Area Networks (WPAN) allow for the implementation of applications such as home automation, remote control services, near-field technologies and personal health care management.
A Survey of Man In The Middle Attacks
TLDR
This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
Raspberry Pi: Data logging IOT device
The Electronic Control Module (ECM) is the heart of the electronic engine. It looks after the supervisory and the controlling parameters of the engine. Its main function is to monitor all the
Future Edge Cloud and Edge Computing for Internet of Things Applications
TLDR
This survey paper investigates the key rationale, the state-of-the-art efforts, the key enabling technologies and research topics, and typical IoT applications benefiting from edge cloud.
Performance analysis of communication protocols for Internet of things platforms
  • Jhon Ramirez, C. Pedraza
  • Computer Science
    2017 IEEE Colombian Conference on Communications and Computing (COLCOM)
  • 2017
TLDR
This paper presents a comparative study of the main communication protocols that allows the implementation of an IoT platform, to determine their computational load, overhead and network bandwidth.
Improvement of Key Exchange protocol to prevent Man-in-the-middle attack in the satellite environment
  • In-A Song, Young-seok Lee
  • Computer Science
    2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)
  • 2016
TLDR
The protocol which can prevent Man-in-the-middle attack using Timestamp is suggested, and the proposed protocol is compared with existing protocols through performance analysis, showing its resource management and the efficiency of communication.
Key exchange protocol for WSN resilient against man in the middle attack
  • N. Saqib
  • Computer Science
    2016 IEEE International Conference on Advances in Computer Applications (ICACA)
  • 2016
TLDR
Elliptic Curve Cryptography (ECC) has been utilized to develop an improved key exchange mechanism for wireless sensor networks and the developed Protocol has been simulated in TinyOS using Tossim simulator.
...
1
2
3
...