Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
@article{Zhang2017UnderstandingIS, title={Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be}, author={N. Zhang and S. Demetriou and Xianghang Mi and Wenrui Diao and Kan Yuan and P. Zong and F. Qian and X. Wang and K. Chen and Y. Tian and Carl A. Gunter and K. Zhang and P. Tague and Yue-Hsun Lin}, journal={ArXiv}, year={2017}, volume={abs/1703.09809} }
Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale availability problems. To mitigate such threats, a few solutions have been proposed. However, it is… CONTINUE READING
Figures, Tables, and Topics from this paper
32 Citations
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
- Computer Science
- IEEE Access
- 2020
- PDF
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
- Computer Science
- 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- 2019
- 8
- PDF
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2019
- 100
- PDF
Program Analysis of Commodity IoT Applications for Security and Privacy
- Computer Science
- ACM Comput. Surv.
- 2019
- 45
- PDF
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
- Computer Science
- NDSS
- 2018
- 93
- PDF
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
- Computer Science
- IEEE Access
- 2020
- 11
- PDF
Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure
- Business, Computer Science
- ICTRS
- 2019
- 1
- PDF
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2020
- 58
- PDF
IoT European Security and Privacy Projects: Integration, Architectures and Interoperability
- Computer Science
- 2018
- 2
- PDF
References
SHOWING 1-10 OF 143 REFERENCES
Twenty Security Considerations for Cloud-Supported Internet of Things
- Computer Science
- IEEE Internet of Things Journal
- 2016
- 181
- PDF
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
- Computer Science
- HotNets
- 2015
- 216
- Highly Influential
- PDF
Proposed embedded security framework for Internet of Things (IoT)
- Computer Science
- 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
- 2011
- 193
Security analysis on consumer and industrial IoT devices
- Engineering, Computer Science
- 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)
- 2016
- 144
- Highly Influential
- PDF
Security and privacy challenges in industrial Internet of Things
- Computer Science, Engineering
- 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)
- 2015
- 525
- PDF
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2015
- 666
- PDF
Security, privacy and trust in Internet of Things: The road ahead
- Computer Science
- Comput. Networks
- 2015
- 1,106
- PDF
Context Aware Computing for The Internet of Things: A Survey
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2014
- 2,077
- PDF
Network-level security and privacy control for smart-home IoT devices
- Computer Science
- 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
- 2015
- 189
- PDF