2020
DOI: 10.1109/access.2020.2968627
|View full text |Cite
|
Sign up to set email alerts
|

Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices

Abstract: This paper proposes a solution for low-cost consumer IoT devices to employ end-to-end security without requiring additional hardware. Manufacturers of consumer IoT devices often sacrifice security in favour of features, user-friendliness, time to market or cost, in order to stay ahead of their competitors. However, this is unwise, as demonstrated by recent hacks on consumer IoT devices. Low-cost embedded devices struggle to create suitable entropy for key generation; on the other hand, smartphones are both abu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
(15 reference statements)
0
4
0
Order By: Relevance
“…This method estimates the states of the home based on the sensed values and operating statuses of IoT devices. As with the proposed method, the estimation-based method calculated the b and α using Equations (5)(6)(7)(8)(9). We calculated the probability that the operation was legitimate by multiplying b to α and by summarizing them.…”
Section: Estimation-based Anomaly Detection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…This method estimates the states of the home based on the sensed values and operating statuses of IoT devices. As with the proposed method, the estimation-based method calculated the b and α using Equations (5)(6)(7)(8)(9). We calculated the probability that the operation was legitimate by multiplying b to α and by summarizing them.…”
Section: Estimation-based Anomaly Detection Methodsmentioning
confidence: 99%
“…After training the model, when an event sequence, y, includes operations of the detection target device, the proposed method calculates the state probability α (T (y)−∆T ) (i) using Equations ( 7), (8), and (9). The proposed method calculates the probability of occurrence δ (T (y)−∆T ) (y) of the sequence y by multiplying the state probabilities, α (T (y)−∆T ) (i), by the behavior sequence probability, b ′ (i, y), as described in Equation ( 13):…”
Section: Detection Using the Learned Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this creates a barrier requiring additional hardware which would increase the cost of the device. IoT devices are price sensitive, and even a small increase in cost deters consumers [15], [16]. Manufacturers also struggle to differentiate themselves based on security features so instead invest in more marketable features [17].…”
Section: Introductionmentioning
confidence: 99%