2019
DOI: 10.36244/icj.2019.2.1
|View full text |Cite
|
Sign up to set email alerts
|

IoT Hacking – A Primer

Abstract: The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or et… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 35 publications
0
5
0
1
Order By: Relevance
“…New security vulnerabilities of system-of-systems appear due to the growth of IoT, which are caused by heterogeneity, decentralization, and individual vulnerabilities of IoT systems [ 45 , 46 ]. The complexity of deploying security mechanisms in resource-constrained IoT networks [ 47 ] resulted in difficulty in implementing traditional security techniques such as encryption, authentication, and authorization which might not be appropriate anymore.…”
Section: Overviewmentioning
confidence: 99%
“…New security vulnerabilities of system-of-systems appear due to the growth of IoT, which are caused by heterogeneity, decentralization, and individual vulnerabilities of IoT systems [ 45 , 46 ]. The complexity of deploying security mechanisms in resource-constrained IoT networks [ 47 ] resulted in difficulty in implementing traditional security techniques such as encryption, authentication, and authorization which might not be appropriate anymore.…”
Section: Overviewmentioning
confidence: 99%
“…The fundamental premise of improving security behaviors is that cybersecurity is both a technical and a psychological challenge [6,86], as even the most sophisticated technical measures fail to protect data privacy and security when not used as intended by the designer. Expertise [43,114] and awareness [62,98] trainings have proliferated, but the heterogeneity of users, their prior knowledge, and abilities [48,100], pose an insurmountable challenge to these interventions when implemented on a larger-scale.…”
Section: Latent Influences On Cybersecurity Behaviormentioning
confidence: 99%
“…Other works describe a whole methodology with concrete cases. A manual for hacking IoT devices is presented in [47]. Gupta [15] presents a whole handbook for practical hacking of different devices.…”
Section: Related Workmentioning
confidence: 99%