2020
DOI: 10.1145/3394504
|View full text |Cite
|
Sign up to set email alerts
|

Internet-scale Insecurity of Consumer Internet of Things

Abstract: The number of Internet-of-Things (IoT) devices actively communicating across the Internet is continually increasing, as these devices are deployed across a variety of sectors, constantly transferring private data across the Internet. Due to the extensive deployment of such devices, the continuous discovery and persistence of IoT-centric vulnerabilities in protocols, applications, hardware, and the improper management of such IoT devices has resulted in the rampant, uncontrolled spread of malware threatening co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 37 publications
2
26
0
Order By: Relevance
“…It allows shifting the paradigm "from the Internet of Things (IoT) to Internet of Intelligence (IoI)" to provide connectivity, while maintaining the ability to process knowledge and make decisions autonomously [47]. It aims to develop a novel methodology for fingerprinting IoT devices by building data-driven techniques rooted in machine learning methods, which allows unveiling compromised IP addresses throughout diverse geographical areas [5]. Moreover, and since there is a lack of effective IoT cyber risk management frameworks [69], of effective sensor networks [70], it raises the issue of a distributed denial of service (DDoS) in terms of classifications and opportunities for attacks, particularly in the health sector, in areas of limited security [22], while examining the changing legal environment in a IoT regulatory context [48].…”
Section: The Internet Of Things (Iot)mentioning
confidence: 99%
See 1 more Smart Citation
“…It allows shifting the paradigm "from the Internet of Things (IoT) to Internet of Intelligence (IoI)" to provide connectivity, while maintaining the ability to process knowledge and make decisions autonomously [47]. It aims to develop a novel methodology for fingerprinting IoT devices by building data-driven techniques rooted in machine learning methods, which allows unveiling compromised IP addresses throughout diverse geographical areas [5]. Moreover, and since there is a lack of effective IoT cyber risk management frameworks [69], of effective sensor networks [70], it raises the issue of a distributed denial of service (DDoS) in terms of classifications and opportunities for attacks, particularly in the health sector, in areas of limited security [22], while examining the changing legal environment in a IoT regulatory context [48].…”
Section: The Internet Of Things (Iot)mentioning
confidence: 99%
“…The IoT is a system where the Internet is linked to the physical world through sensors [2]. It can be deemed as the management of a network of devices, home appliances, and vehicles of the IoT, and is challenging due to the dynamic nature of the linkage between devices, actors, and resource constraints [3,4] involving hardware, software, sensors, and connectivity that allows them to connect, gather, and exchange data [5]. At the core of the IoT is the "smart factory", which comprehends several different elements: person, process, intelligent object, and technological ecosystem [6].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, others, propose solutions to new wireless challenges such as the 6G, shifting the paradigm "from Internet of Things (IoT) to Internet of Intelligence (IoI)", to provide connectivity, while mantaining the ability to process knowledge and make de-cisions autonomously [47]. Developing thus a novel methodology for fingerprinting IoT devices, by building data-driven techniques rooted in machine learning methods, which allows to unveil compromised IP addresses throughout diverse geographical areas [5]. Also it focus on the issue of distributed denial of service (DDoS) scope, in terms of classifications and opportunities for attacks, particularly in the health sector, of limited security [22], while examining the changing legal environment in the IoT regulatory context [48]; 4.4.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…However, IoT is fragile in terms of many security is-sues that are frequently highly demanding due to its complex context and a vast num-ber of tools, which present flaws in terms of resources [1]. IoT is a system where the Internet is linked to the physical world through sensors [2] and can be deemed as the management of a network of devices, home appliances and vehicles of the IoT that is challenging due to the dynamic nature of the linkage between devices, actors and re-source constraints [3,4] involving hardware, software, sensors, and connectivity which allows them to connect, gather and exchange data [5]. Central for for IoT is the "smart factory", in which comprehends diverse elements: person, process, intelligent object and technological ecosystem [6].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, Internet measurements have been utilized to find insecurely configured embedded devices [10], detect compromised IoT devices [42,46,58], and study cloud usage as well as communication security of IoT devices [54]. Motivated by these observations, we set out to study whether modern Internet-facing industrial appliances that use the OPC UA protocol capitalize on the promised increases in security.…”
Section: Related Workmentioning
confidence: 99%