Proceedings of the 2017 Workshop on Internet of Things Security and Privacy 2017
DOI: 10.1145/3139937.3139949
|View full text |Cite
|
Sign up to set email alerts
|

Toward Usable Network Traffic Policies for IoT Devices in Consumer Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Researchers have found that many applications built on emerging programming platforms such as Samsung's SmartThings [2] are over-privileged due to design flaws in their permission models [20,22]. To address these types of technical vulnerabilities, researchers have proposed network-traffic-analysis-based security mechanisms [8,15,16,40,45,46,53], user-centric and context-aware permission systems [21,31,49], analyses to identify incorrect or inconsistent application behaviors [11,38,51], and decentralized automation platforms with more fine-grained authentication tokens [23].…”
Section: Technical Vulnerabilitiesmentioning
confidence: 99%
“…Researchers have found that many applications built on emerging programming platforms such as Samsung's SmartThings [2] are over-privileged due to design flaws in their permission models [20,22]. To address these types of technical vulnerabilities, researchers have proposed network-traffic-analysis-based security mechanisms [8,15,16,40,45,46,53], user-centric and context-aware permission systems [21,31,49], analyses to identify incorrect or inconsistent application behaviors [11,38,51], and decentralized automation platforms with more fine-grained authentication tokens [23].…”
Section: Technical Vulnerabilitiesmentioning
confidence: 99%
“…Although it is not suitable for novice users, manual rules input is the most accurate method of obtaining user input. The connections between de-vices depend on the user activities [40]. Hence, in a simple environment, advanced users [75] can customise the pre-defined policies [172,73], such as MUD [101], to meet their security and privacy requirements.…”
Section: Motivationmentioning
confidence: 99%
“…Hence, in a simple environment, advanced users [75] can customise the pre-defined policies [172,73], such as MUD [101], to meet their security and privacy requirements. Smart spaces also include other security services such as IDS [161,134,40,116]. Thus, there are three main security components for smart spaces: user input, pre-defined IoT policies, and network security middleboxes, which need to be incorporated when designing smart space security system.…”
Section: Motivationmentioning
confidence: 99%
“…Similarly, DeMarinis and Fonseca [10] state that a networklayer architecture is required for the protection of a smart home against external threats and the mitigation of attacks from compromised devices. The authors recommend the implementation of a policy-based framework to restrict malicious traffic.…”
Section: B Security Frameworkmentioning
confidence: 99%