2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2018
DOI: 10.1109/eurospw.2018.00011
|View full text |Cite
|
Sign up to set email alerts
|

Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution

Abstract: The Internet of Things (IoT) network of connected devices currently contains more than 11 billion devices and is estimated to double in size within the next four years. The prevalence of these devices makes them an ideal target for attackers. To reduce the risk of attacks vendors routinely deliver security updates (patches) for their devices. The delivery of security updates becomes challenging due to the issue of scalability as the number of devices may grow much quicker than vendors' distribution systems. Pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 24 publications
0
28
0
Order By: Relevance
“…This allows our implementation to insert an app's information such as the app ID and app name (lines 6-8), and obtain an app's events (line 10), actions, numerical-valued attributes, and predicates that guard actions (line 15 and 20). The information is transmitted to IOTGUARD's data collector (line 16 and 24) through a JSON object with additional information obtained from the app's state, event, and device object instances (lines [29][30][31][32][33][34][35][36][37][38][39][40]. The event object in SmartThings allows accessing the event properties [15]; for example, the event type is obtained through evt.value (line 34).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This allows our implementation to insert an app's information such as the app ID and app name (lines 6-8), and obtain an app's events (line 10), actions, numerical-valued attributes, and predicates that guard actions (line 15 and 20). The information is transmitted to IOTGUARD's data collector (line 16 and 24) through a JSON object with additional information obtained from the app's state, event, and device object instances (lines [29][30][31][32][33][34][35][36][37][38][39][40]. The event object in SmartThings allows accessing the event properties [15]; for example, the event type is obtained through evt.value (line 34).…”
Section: Methodsmentioning
confidence: 99%
“…Most attempts to date in IoT security and privacy aim to improve perimeter defenses that harden the IoT infrastructure against attacks using firewalls [30], intrusion detection [54], access control policies [22], and software patches [32]. Yet, perimeter security measures do not enforce safe behavior of physical processes in IoT systems.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, the security of firmware update has been discussed in several contexts, including wireless sensor network [17], [18], IoT [19], [20], vehicular network [21], etc. The existing works can be classified either as centralized (client-server model) or decentralized.…”
Section: Related Workmentioning
confidence: 99%
“…In [20], the authors proposed software update framework for Internet of Things (IoT) devices. The framework allows other parties to deliver the updates in return for digital currency paid by the vendor.…”
Section: Related Workmentioning
confidence: 99%
“…They used smart contract and the consensus mechanism of blockchain to preserve the integrity of updates. Recently, Leiba et al [25] proposed decentralized incentivized delivery network for IoT software updates. The participating nodes of delivery network deliver update to IoT devices and the nodes can get the financial incentive from the vendors.…”
Section: Introductionmentioning
confidence: 99%