Corpus ID: 216553301

Best Practices for IoT Security: What Does That Even Mean?

@article{Bellman2020BestPF,
  title={Best Practices for IoT Security: What Does That Even Mean?},
  author={Christopher Bellman and Paul C. van Oorschot},
  journal={ArXiv},
  year={2020},
  volume={abs/2004.12179}
}
Best practices for Internet of Things (IoT) security have recently attracted considerable attention worldwide from industry and governments, while academic research has highlighted the failure of many IoT product manufacturers to follow accepted practices. We explore not the failure to follow best practices, but rather a surprising lack of understanding, and void in the literature, on what (generically) "best practice" means, independent of meaningfully identifying specific individual practices… Expand
A Lemon by Any Other Label
TLDR
It is found that there is limited research in this area, which makes it difficult to ascertain the components of an effective IoT security label, and it is recommended that label designs should limit complexity and leverage existing institutions, such as trade groups, for sustainability as well as adoption. Expand
Assessment of Digitalized Logistics for Implementation in Low-Income Countries
Integration of digitalization and automation with logistics systems promotes effective and efficient flow of goods, information, and services, contributing to economic development. The level ofExpand
SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME
  • Suryadipta Majumdar, D. Bastos, Anoop Singhal
  • Computer Science
  • Advances in Digital Forensics XVII
  • 2021

References

SHOWING 1-10 OF 62 REFERENCES
Exploring Security Economics in IoT Standardization Efforts
TLDR
A case study is presented that investigates disclosed insecurities of the popular IoT standard ZigBee, and general lessons about security economics are derived, ranging from the definition of a precise security model to the enforcement of an update policy. Expand
BEST SECURITY PRACTICES: AN OVERVIEW
Security technology is important to security, but the practices of the people who develop, integrate, evaluate, configure, maintain, and use that technology are more important; indeed, theseExpand
SoK: Security Evaluation of Home-Based IoT Deployments
TLDR
This work systematize the literature for home-based IoT using this methodology in order to understand attack techniques, mitigations, and stakeholders, and evaluates \numDevices devices to augment the systematized literature inorder to identify neglected research areas. Expand
Internet of Things
TLDR
The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday. Expand
Privacy in the Internet of Things
TLDR
The chapter presents the IoT technology, the various applications, and privacy issues, and various other issues such as security and performance are also addressed. Expand
Operating Systems for Low-End Devices in the Internet of Things: A Survey
TLDR
This paper analyzes in detail the specific requirements that an OS should satisfy to run on low-end IoT devices, and surveys applicable OSs, focusing on candidates that could become an equivalent of Linux for such devices, i.e., a one-size-fits-most, open source OS for low- end IoT devices. Expand
The State of Public Infrastructure-as-a-Service Cloud Security
TLDR
It is found that the cloud industry has established a number of “best-practices,” while other security mechanisms vary widely, indicating that there is also still room for innovation and experimentation in the public IaaS cloud industry. Expand
E-Spion: A System-Level Intrusion Detection System for IoT Devices
TLDR
E-Spion is introduced, an anomaly-based system level Intrusion Detection System (IDS) for IoT devices that profiles IoT devices according to their 'behavior' using system level information, like running process parameters and their system calls in an autonomous, efficient, and scalable manner. Expand
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
TLDR
A new type of threat in which adjacent IoT devices will infect each other with a worm that will rapidly spread over large areas, provided that the density of compatible IoT devices exceeds a certain critical mass is described. Expand
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security
TLDR
IoT security protocols standardized by the Internet Engineering Task Force do not completely secure IoT devices, but they go a long way. Expand
...
1
2
3
4
5
...