2019
DOI: 10.1007/978-3-030-18419-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Securing Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…• weak/broken or inadequate authentication (e.g., single-factor authentication method using a username and password) [8,23,26,37,38]; • broken access control [23]; • Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol is vulnerable to several well-known attacks, such as man-in-the-middle (MITM) and denial of service (DoS), and suffers from the disclosure of user identity on first access to the network [39]; • 5G-AKA allows for replay attacks since authentication and synchronization failure messages are sent to the device in plain text [40]; • other messages, such as RRC (Radio Resource Control) and NAS (Non-access stratum), are sent to the device in plain text, which can generate DoS and other attacks that compromise the confidentiality, as already happens with 4G [40]; • lack of attestation to know if a device is compromised [13];…”
Section: Processmentioning
confidence: 99%
“…• weak/broken or inadequate authentication (e.g., single-factor authentication method using a username and password) [8,23,26,37,38]; • broken access control [23]; • Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol is vulnerable to several well-known attacks, such as man-in-the-middle (MITM) and denial of service (DoS), and suffers from the disclosure of user identity on first access to the network [39]; • 5G-AKA allows for replay attacks since authentication and synchronization failure messages are sent to the device in plain text [40]; • other messages, such as RRC (Radio Resource Control) and NAS (Non-access stratum), are sent to the device in plain text, which can generate DoS and other attacks that compromise the confidentiality, as already happens with 4G [40]; • lack of attestation to know if a device is compromised [13];…”
Section: Processmentioning
confidence: 99%
“…Qiaoyang Zhang [25] provided a new security framework where a client and server can establish secure keys using a QR code and use them to secure the BLE channel for message transmission. Gong [26] proposed a new encryption algorithm for IoT devices that help in improving the transmission success rate. Yue Zhang et al [27] built a prototype for the SCO mode so that the SCO initiation can be properly handled by initiator.…”
Section: Related Workmentioning
confidence: 99%
“…The following metrics are used to evaluate the hardware implementation efficiency: 1) Gate equivalent (GE) [2], [4], [18], [27], [34], [35]: this metric measures the memory consumption and implementation size. The GE is defined as the area occupied by the semiconductor [34].…”
Section: Hardware Implementationmentioning
confidence: 99%
“…This metric measures how much physical area is required for a circuit that implements a primitive. Gong [4] noted that the physical area allocation in an LWC implementation should be less than 2000 GE. The metric can be defined with the following equation:…”
Section: Hardware Implementationmentioning
confidence: 99%
See 1 more Smart Citation