• Corpus ID: 33488683

Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things

@article{Fu2020SafetySA,
  title={Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things},
  author={Kevin Fu and Tadayoshi Kohno and Daniel P. Lopresti and Elizabeth D. Mynatt and Klara Nahrstedt and Shwetak N. Patel and Debra Richardson and Benjamin G. Zorn},
  journal={ArXiv},
  year={2020},
  volume={abs/2008.00017}
}
The Internet of Things (IoT) is already transforming industries, cities, and homes. The economic value of this transformation across all industries is estimated to be trillions of dollars and the societal impact on energy efficiency, health, and productivity are enormous. Alongside potential benefits of interconnected smart devices comes increased risk and potential for abuse when embedding sensing and intelligence into every device. One of the core problems with the increasing number of IoT… 

Combat security and privacy challenges of the Internet of Things, as an intelligent system

  • Computer Science
  • 2019
The goal of this research project is to develop and evaluate new techniques for securing IoT devices, such as Amazon’s Alexa, and networks throughout their entire life process and expectancy.

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

The security and privacy effects of eight IoT features including the threats they cause, existing solutions to threats and research challenges yet to be solved are discussed and how IoT features affect existing security research is revealed.

Medical Device Security in the IoT Age

  • Jon B. Martinez
  • Computer Science
    2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
  • 2018
The analysis of this paper will focus on the issues inherent with the current process of discovery, the updating and patching of vulnerable software processes, manufacturer responsibilities, and potential interim solutions for healthcare providers that can help identify risks as the authors wait for changes to the current FDA processes and provide steps that healthcare providers can take in the interim to protect their networks.

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges

A comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area is provided and possible areas of implementation and consideration are given to discuss open issues.

AES and MQTT based security system in the internet of things

A model is proposed using Advanced Encryption Standard-256 and Secure Hashing Algorithm-256 to attain the security in the IoT system and three- layer security has been added to data collected by smart objects before transmission.

Privacy and security in the big data paradigm

The result shows that privacy and security face new challenges and require new policies, technologies, and tools for protecting privacy in the big data paradigm.

Research Report: User Perceptions of Smart Home Privacy and Security

It is found that users have varied, and often unclear, understandings of how smart home data are collected and used, and they feel limited responsibility for mitigating these due to constrained options or lack of knowledge to enact more sophisticated countermeasures.

"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security

An in-depth interview study of 40 smart home adopters reveals that participants’ perceptions of responsibility reflect an interdependent relationship between consumers, manufacturers, and third parties such as the government, and suggests ways in which these actors can address gaps and better support each other.

International Journal of Innovative Technology and Exploring Engineering (IJITEE)

The proposed system proposes an integrated model that combines lightweight encryption technique with robust and cost-efficient authentication mechanism that introduces digital signature-based authentication and complexity minimization in order to resist the involvement of any kind of unknown attacks.

Users Issues in using the Internet of Things Systems

This paper analyzes the more than 90,000 reviews of ten IoT devices and their corresponding apps and extracts the issues that users encountered in using these systems, indicating that issues with connectivity, timing, and update are particularly prevalent in the reviews.