2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2015
DOI: 10.1109/wowmom.2015.7158207
|View full text |Cite
|
Sign up to set email alerts
|

Experiments with security and privacy in IoT networks

Abstract: We explore the risks to security and privacy in IoT networks by setting up an inexpensive home automation network and performing a set of experiments intended to study attacks and defenses. We focus on privacy preservation in home automation networks but our insights can extend to other IoT applications. Privacy preservation is fundamental to achieving the promise of IoT, Industrial Internet and M2M. We look at both simple cryptographic techniques and information manipulation to protect a user against an adver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 6 publications
0
19
0
1
Order By: Relevance
“…Latest evaluations of IoT networks for security and privacy can be found in [20]. The authors focused on preserving privacy in home automation networks that is claimed to be extended to IoT applications.…”
Section: Existing Solution and Discussionmentioning
confidence: 99%
“…Latest evaluations of IoT networks for security and privacy can be found in [20]. The authors focused on preserving privacy in home automation networks that is claimed to be extended to IoT applications.…”
Section: Existing Solution and Discussionmentioning
confidence: 99%
“…Smart sensors including radio frequency identification (RFID) tags, serve three broad purposes. They identify items, locate them and determine their environmental conditions, all of which have major implications for the supply chain and manufacturing [11]. Sensor data can be distributed through our device and sent to the data center to be analyzed [12].…”
Section: Project Prototypementioning
confidence: 99%
“…Traffic analysis must be thwarted to lesson privacy issues, and this paper utilizes packet injection as one such approach. In [17], Lego MindStorms robot was used to randomly set off an arbitrary motion detector to create extra packet traffic in the network. This, however, is not always realistic for average homeowner to set up.…”
Section: A Previously Implemented Solutionsmentioning
confidence: 99%