2021
DOI: 10.3390/fi13050117
|View full text |Cite
|
Sign up to set email alerts
|

H2O: Secure Interactions in IoT via Behavioral Fingerprinting

Abstract: Sharing data and services in the Internet of Things (IoT) can give rise to significant security concerns with information being sensitive and vulnerable to attacks. In such an environment, objects can be either public resources or owned by humans. For this reason, the need of monitoring the reliability of all involved actors, both persons and smart objects, assuring that they really are who they claim to be, is becoming an essential property of the IoT, with the increase in the pervasive adoption of such a par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 77 publications
0
4
0
Order By: Relevance
“…H2O introduces a mechanism to authenticate the identity of objects or humans based on their claims. The study includes a security analysis of the framework, which encompasses an attack model, demonstrating that the proposed solution effectively achieves its objectives even when faced with potential attacks [26]. In their latest research, Yin et al ( 2021) introduce an IoT-oriented privacy-preserving fingerprint authentication system.…”
Section: Reviewmentioning
confidence: 99%
“…H2O introduces a mechanism to authenticate the identity of objects or humans based on their claims. The study includes a security analysis of the framework, which encompasses an attack model, demonstrating that the proposed solution effectively achieves its objectives even when faced with potential attacks [26]. In their latest research, Yin et al ( 2021) introduce an IoT-oriented privacy-preserving fingerprint authentication system.…”
Section: Reviewmentioning
confidence: 99%
“…IoT devices are now prone to several vulnerabilities. Services and data in the IoT may be susceptible to attack because of their sensitive nature [293].…”
Section: Vulnerabilities In Iotmentioning
confidence: 99%
“…IoT devices are now prone to several vulnerabilities. Services and data in the IoT may be susceptible to attack because of their sensitive nature [281]. Many IoT systems and a highly complex ecosystem in IoT can have increased risks from significant problems in cloud security [282].…”
Section: Vulnerabilities In Iotmentioning
confidence: 99%
“…By combining cybersecurity measures, assurance services, and best practices, blockchain networks can minimise the risk of attacks and fraud [8]. However, it is important to note that security in a blockchain network depends on the behaviour of system participants, not just the technology itself [9]. Although traditional industrial networks such as Modbus, Profinet, KNX, CanBus, BacNet, and EtherCat remain widely used in Industry 4.0 and are unlikely to be replaced entirely by blockchain-based networks, integrating blockchain technology with these networks through gateways or adapters can provide secure and scalable data exchange while maintaining the functionality of existing networks.…”
Section: Introductionmentioning
confidence: 99%