Assessment and Hardening of IoT Development Boards

  title={Assessment and Hardening of IoT Development Boards},
  author={Omar Alfandi and Musaab Hasan and Zayed Balbahaith},
Internet of Things (IoT) products became recently an essential part of any home in conjunction with the great advancements in internet speeds and services. The invention of IoT based devices became an easy task that could be performed through the widely available IoT development boards. Raspberry Pi is considered one of the advanced development boards that have high hardware capabilities with a reasonable price. Unfortunately, the security aspect of such products is overlooked by the developers… 



Security and privacy on internet of things

The privacy and security challenges in the IoT are analyzed and survey on the corresponding solutions to enhance the security of IoT architecture and protocol.

Research and implementation of access control model of internet of things

  • Wang LeiLiutong Xu
  • Computer Science
    2016 5th International Conference on Computer Science and Network Technology (ICCSNT)
  • 2016
This paper analyzes some popular solutions to authority management in open platform of Internet, and puts up a new access control model that can distribute permissions flexibly, which means authority manager can manage authorities pretty easily, and authorities can be allocated in a real-time, dynamic condition.

A survey of internet of things, enabling technologies and protocols

The different technologies that enable the smart objects to be come a part of the IoT network and the different protocols that have been proposed from time to time are studied.

A ZigBee honeypot to assess IoT cyberattack behaviour

A honeypot is created that simulates a ZigBee gateway and it is designed to assess the presence of ZigBee attack intelligence on a SSH attack vector and concludes that all captured mass attacks are mainstream DDoS and bot malware, whereas individual attackers where attracted to and interacted with the ZigBee simulated Honeypot.

A Survey of Man In The Middle Attacks

This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.

Raspberry Pi: Data logging IOT device

  • Tanaya TavadeP. Nasikkar
  • Computer Science
    2017 International Conference on Power and Embedded Drive Control (ICPEDC)
  • 2017
The Electronic Control Module (ECM) is the heart of the electronic engine. It looks after the supervisory and the controlling parameters of the engine. Its main function is to monitor all the

Future Edge Cloud and Edge Computing for Internet of Things Applications

This survey paper investigates the key rationale, the state-of-the-art efforts, the key enabling technologies and research topics, and typical IoT applications benefiting from edge cloud.

Performance analysis of communication protocols for Internet of things platforms

  • Jhon RamirezC. Pedraza
  • Computer Science
    2017 IEEE Colombian Conference on Communications and Computing (COLCOM)
  • 2017
This paper presents a comparative study of the main communication protocols that allows the implementation of an IoT platform, to determine their computational load, overhead and network bandwidth.

Improvement of Key Exchange protocol to prevent Man-in-the-middle attack in the satellite environment

  • In-A SongYoung-seok Lee
  • Computer Science
    2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)
  • 2016
The protocol which can prevent Man-in-the-middle attack using Timestamp is suggested, and the proposed protocol is compared with existing protocols through performance analysis, showing its resource management and the efficiency of communication.

Key exchange protocol for WSN resilient against man in the middle attack

  • N. Saqib
  • Computer Science
    2016 IEEE International Conference on Advances in Computer Applications (ICACA)
  • 2016
Elliptic Curve Cryptography (ECC) has been utilized to develop an improved key exchange mechanism for wireless sensor networks and the developed Protocol has been simulated in TinyOS using Tossim simulator.