Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2737091
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Security Threats and Countermeasures in IoT

Abstract: Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT network leads the risk of security and confidentiality of data. This paper analyzes different security issues, their counte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(36 citation statements)
references
References 8 publications
0
36
0
Order By: Relevance
“…In other words, the end node has to use only one AppKey for a lifetime. As pointed out in several previous IoT security studies [8][9][10], we have to prepare for key leakage, which can have various causes, such as node capture attacks and side channel attacks.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, the end node has to use only one AppKey for a lifetime. As pointed out in several previous IoT security studies [8][9][10], we have to prepare for key leakage, which can have various causes, such as node capture attacks and side channel attacks.…”
Section: Problem Statementmentioning
confidence: 99%
“…Moreover, the damage from security incidents can be unprecedentedly enormous due to the large scale and connectivity of the IoT environment. To prepare for this situation, previous studies on IoT security [8][9][10] have addressed some important factors, one of which is key management. According to the research, cryptographic keys can be leaked through various attacks, considering that IoT sensing devices are usually deployed where the attacker can access them.…”
Section: Introductionmentioning
confidence: 99%
“…The communication scenario between the IoT devices and the Internet/data server may vary based on applications. For instance, a WMS-based IoT application might use a hand-held device like a smart-phone as the gateway device [97]. A larger application like a weather monitoring system might use dedicated gateway devices for specific regions.…”
Section: Infrastructure For Sensor Based Applicationsmentioning
confidence: 99%
“…Hence, it is not hardheaded for the radio communicating application. Particularly, it is obvious for IoT application [19]. As well, for the assure purpose, the social-aware networking has been aimed to the assure cooperative communicating arrangements [6,17].…”
Section: Introductionmentioning
confidence: 99%