2017
DOI: 10.1049/et.2017.0303
|View full text |Cite
|
Sign up to set email alerts
|

Securing IoT: your smart home and your connected enterprise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…The Internet of Things (IoT) is globally expanding, providing diverse benefits in nearly every aspect of our lives [3,28,37,42,44]. Unfortunately, the IoT is also accompanied by a large number of information security vulnerabilities and exploits [1,3,8,23,30,32,37,38,44]. If we take into account the inherent computational limitations of IoT devices in addition to their typical vulnerabilities, the ease by which hackers can locate them (e.g., Shodan [25]), and their expected proliferation worldwide [17,34], then both the risks and the projected global impact of connecting IoT devices to the network in any modern environment become clearly evident.…”
Section: Introductionmentioning
confidence: 99%
“…The Internet of Things (IoT) is globally expanding, providing diverse benefits in nearly every aspect of our lives [3,28,37,42,44]. Unfortunately, the IoT is also accompanied by a large number of information security vulnerabilities and exploits [1,3,8,23,30,32,37,38,44]. If we take into account the inherent computational limitations of IoT devices in addition to their typical vulnerabilities, the ease by which hackers can locate them (e.g., Shodan [25]), and their expected proliferation worldwide [17,34], then both the risks and the projected global impact of connecting IoT devices to the network in any modern environment become clearly evident.…”
Section: Introductionmentioning
confidence: 99%
“…Elfutils is a collection of utilities, including eu-ld (a linker), eu-nm (for listing symbols from object files), eu-size (for listing the section sizes of an object or archive file), eu-strip (for discarding symbols), eu-readelf (to see the raw ELF file structures), and eu-elflint (for checking for well-formed ELF files) 5 . It provides alternative tools to GNU Binutils, and also allows validating ELF files.…”
Section: A Overviewmentioning
confidence: 99%
“…In actuality, many companies rarely mention security and privacy in their marketing materials (Wilson, Hargreaves, & Hauxwell-Baldwin, 2017), and this lack of mention may be indicative of their current design efforts. Although the U.S. government has released general design principles related to IoT security, these principles have not been translated into binding human-centric regulations (Moskvitch, 2017; Ziegeldorf, Garcia-Morchon, & Wehlrle, 2014). These oversights may, in part, be due to misconceptions about the potential role that humans can play in securing IoT devices and protecting their personal information (Aleisa & Renaud, 2017).…”
Section: What Is the Current State Of Iot?mentioning
confidence: 99%