2014
DOI: 10.1007/978-3-662-43826-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Sweet Dreams and Nightmares: Security in the Internet of Things

Abstract: Abstract. Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have bee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…wireless sensor nodes). Such resource constraints pose a massive challenge for the implementation of measures to minimize sidechannel leakage, which makes IoT devices an easy target for attacks [22]. It is widely believed in the cryptographic community that side-channel attacks are primarily an implementation problem rather than a design problem, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…wireless sensor nodes). Such resource constraints pose a massive challenge for the implementation of measures to minimize sidechannel leakage, which makes IoT devices an easy target for attacks [22]. It is widely believed in the cryptographic community that side-channel attacks are primarily an implementation problem rather than a design problem, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…When utilizing block ciphers on IoT devices, it is necessary to consider a side-channel attack. The side-channel attack exploits the information when the device is working, (e.g., electromagnetic wave or heat) [9]. There are several proposals for countermeasures [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, many connected devices are known for their limited memory space and computational capabilities. Then, conventional privacy solutions as encryption methods, and other security systems as firewall, are inadequate to solve the challenging privacy concerns [4]. One promising solution is the use of game theory to model the interactions of actors and decision challenges in privacy scenarios.…”
Section: Introductionmentioning
confidence: 99%