Proceedings of the 14th ACM Workshop on Hot Topics in Networks 2015
DOI: 10.1145/2834050.2834095
|View full text |Cite
|
Sign up to set email alerts
|

Handling a trillion (unfixable) flaws on a billion devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
4

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 234 publications
(47 citation statements)
references
References 9 publications
0
43
0
4
Order By: Relevance
“…Traditional security solutions such as firewalls, IDSs, anti-viruses, and software patches are not suitable for IoT devices. The three major reasons for this are [45]: (1) Types of policies: a single app may use several IoT devices, communicating explicitly (e.g., via Wi-Fi or Bluetooth) or implicitly (e.g., an IoT light bulb can be triggered by an IoT light sensor). The outcome is a complex and dynamic network which can be hard to secure using a single security policy (e.g., with firewalls).…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional security solutions such as firewalls, IDSs, anti-viruses, and software patches are not suitable for IoT devices. The three major reasons for this are [45]: (1) Types of policies: a single app may use several IoT devices, communicating explicitly (e.g., via Wi-Fi or Bluetooth) or implicitly (e.g., an IoT light bulb can be triggered by an IoT light sensor). The outcome is a complex and dynamic network which can be hard to secure using a single security policy (e.g., with firewalls).…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
“…Moreover, the competitive IoT device market compels vendors to try and get their products out as fast as they can, prioritizing functionality and the user experience, and ignoring the security aspect. In general, most products hardly deal with security and privacy risks, making them the weakest link in terms of security and the target of attackers interested in breaking into networks and harming systems or leaking information [45]. Thus, despite the fact that security was recognized as a central issue of the IoT market as early as 2011 by Bandyopadhyay et al [5], it still continues to remain a challenge today.…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
“…According to many researchers [45,47] an important aspect in IoT security is device security. Yu et al [45] present multiple known vulnerable devices, with issues such as hardcoded administrative usernames and passwords and open DNS resolvers, which could be used to mount Distribute Denial of Service (DDoS) attacks. Airehrour et al [2] write about a case in 2012, where live footage from TRENDNET IP cameras was available to web users without requiring a password.…”
Section: Vulnerable Devicesmentioning
confidence: 99%
“…In this case, we need to revisit our notion of a software update of the host (the device), and include notions of network-based patches [21]. Although software updates for security are a wellunderstood concept, designing update systems for the IoT poses new challenges because of the unique properties of the physical processes that are under the control of software.…”
Section: Although Ifc Is Not a New Concept As Evidenced By The Multimentioning
confidence: 99%