2020 8th International Symposium on Digital Forensics and Security (ISDFS) 2020
DOI: 10.1109/isdfs49300.2020.9116392
|View full text |Cite
|
Sign up to set email alerts
|

Testing IoT Security: The Case Study of an IP Camera

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…Te Health Insurance, Portability, and Accounting Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) require all healthcare organizations to ensure the safety of health information. Network attacks against IoT terminal devices, such as webcams [15], small routers [16], bluetooth door locks [17], intelligent thermostats [18], and theft of face recognition data [19], have made people gradually realize that IoT devices in IoHT systems may become a tool for attackers to launch network attacks and destroy the stability of IoHT systems or steal user-sensitive information.…”
Section: Requirements Of Ioht Systems Lightweight Authentication Stra...mentioning
confidence: 99%
“…Te Health Insurance, Portability, and Accounting Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) require all healthcare organizations to ensure the safety of health information. Network attacks against IoT terminal devices, such as webcams [15], small routers [16], bluetooth door locks [17], intelligent thermostats [18], and theft of face recognition data [19], have made people gradually realize that IoT devices in IoHT systems may become a tool for attackers to launch network attacks and destroy the stability of IoHT systems or steal user-sensitive information.…”
Section: Requirements Of Ioht Systems Lightweight Authentication Stra...mentioning
confidence: 99%
“…Due to the growth of smart IoT environments, and the widespread adoption of these paradigms by organizations around the globe that incorporate them into their existing infrastructure, the security and integrity of these systems has become a popular topic of study [14], [15], [16], [17]. In this section, we provide research related to the development and utilization of penetration testing techniques in IoT settings, focusing on vulnerability detection.…”
Section: Related Workmentioning
confidence: 99%
“…Abdalla et al [15] presented a penetration testing showcase for the IP camera "Onvif YY HD". The proposed penetration testing process included 3 steps, starting with defining the area of investigation, implementation of process and outcome report presentation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning and machine learning techniques are used in many fields nowadays [2][3][4][5][6]. This system can be made accessible worldwide by various technologies, including IoT and cloud-based systems [7][8][9].…”
Section: Introductionmentioning
confidence: 99%