• Corpus ID: 33488683

Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things

  title={Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things},
  author={Kevin Fu and Tadayoshi Kohno and Daniel P. Lopresti and Elizabeth D. Mynatt and Klara Nahrstedt and Shwetak N. Patel and Debra Richardson and Benjamin G. Zorn},
The Internet of Things (IoT) is already transforming industries, cities, and homes. The economic value of this transformation across all industries is estimated to be trillions of dollars and the societal impact on energy efficiency, health, and productivity are enormous. Alongside potential benefits of interconnected smart devices comes increased risk and potential for abuse when embedding sensing and intelligence into every device. One of the core problems with the increasing number of IoT… 

Combat security and privacy challenges of the Internet of Things, as an intelligent system

  • Computer Science
  • 2019
The goal of this research project is to develop and evaluate new techniques for securing IoT devices, such as Amazon’s Alexa, and networks throughout their entire life process and expectancy.

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

The security and privacy effects of eight IoT features including the threats they cause, existing solutions to threats and research challenges yet to be solved are discussed and how IoT features affect existing security research is revealed.

A Security-Enabled Safety Assurance Framework for IoT-Based Smart Homes

This article presents a security-enabled safety monitoring framework for IoT-based systems, utilizing design-time system analysis to create an executable monitoring model that enables run-time safety assurance provision for a system via collecting and analyzing operational data and evidence to determine the safety status of the system.

Medical Device Security in the IoT Age

  • Jon B. Martinez
  • Computer Science
    2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
  • 2018
The analysis of this paper will focus on the issues inherent with the current process of discovery, the updating and patching of vulnerable software processes, manufacturer responsibilities, and potential interim solutions for healthcare providers that can help identify risks as the authors wait for changes to the current FDA processes and provide steps that healthcare providers can take in the interim to protect their networks.

AES and MQTT based security system in the internet of things

A model is proposed using Advanced Encryption Standard-256 and Secure Hashing Algorithm-256 to attain the security in the IoT system and three- layer security has been added to data collected by smart objects before transmission.

Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network

A fog-assisted software defined networking (SDN) driven intrusion detection/prevention system (IDPS) for IoT networks is proposed for timely identification of various attack models in near real time for effective neutralization of threats using SDN control.

Research Report: User Perceptions of Smart Home Privacy and Security

It is found that users have varied, and often unclear, understandings of how smart home data are collected and used, and they feel limited responsibility for mitigating these due to constrained options or lack of knowledge to enact more sophisticated countermeasures.

"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security

An in-depth interview study of 40 smart home adopters reveals that participants’ perceptions of responsibility reflect an interdependent relationship between consumers, manufacturers, and third parties such as the government, and suggests ways in which these actors can address gaps and better support each other.

Topics of Concern: Identifying User Issues in Reviews of IoT Apps and Devices

This paper analyzes more than 90,000 reviews of ten IoT devices and their corresponding apps and extracts the issues that users encountered while using these systems and calls for a new software-hardware development framework to assist the development of reliable IoT systems.

International Journal of Innovative Technology and Exploring Engineering (IJITEE)

The proposed system proposes an integrated model that combines lightweight encryption technique with robust and cost-efficient authentication mechanism that introduces digital signature-based authentication and complexity minimization in order to resist the involvement of any kind of unknown attacks.