Corpus ID: 14825563

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

@article{Zhang2017UnderstandingIS,
  title={Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be},
  author={N. Zhang and S. Demetriou and Xianghang Mi and Wenrui Diao and Kan Yuan and P. Zong and F. Qian and X. Wang and K. Chen and Y. Tian and Carl A. Gunter and K. Zhang and P. Tague and Yue-Hsun Lin},
  journal={ArXiv},
  year={2017},
  volume={abs/1703.09809}
}
  • N. Zhang, S. Demetriou, +11 authors Yue-Hsun Lin
  • Published 2017
  • Computer Science
  • ArXiv
  • Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale availability problems. To mitigate such threats, a few solutions have been proposed. However, it is… CONTINUE READING
    32 Citations
    Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
    • 8
    • PDF
    Program Analysis of Commodity IoT Applications for Security and Privacy
    • 45
    • PDF
    IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
    • 93
    • PDF
    IoT hacking - A primer
    • 2
    • PDF
    Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    • 58
    • PDF

    References

    SHOWING 1-10 OF 143 REFERENCES
    Twenty Security Considerations for Cloud-Supported Internet of Things
    • 181
    • PDF
    Secure routing for internet of things: A survey
    • 150
    Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
    • 216
    • Highly Influential
    • PDF
    Proposed embedded security framework for Internet of Things (IoT)
    • 193
    Security analysis on consumer and industrial IoT devices
    • 144
    • Highly Influential
    • PDF
    Security and privacy challenges in industrial Internet of Things
    • 525
    • PDF
    Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    • 666
    • PDF
    Security, privacy and trust in Internet of Things: The road ahead
    • 1,106
    • PDF
    Context Aware Computing for The Internet of Things: A Survey
    • 2,077
    • PDF
    Network-level security and privacy control for smart-home IoT devices
    • 189
    • PDF