2018
DOI: 10.1109/mwc.2017.1800120
|View full text |Cite
|
Sign up to set email alerts
|

A Castle of Glass: Leaky IoT Appliances in Modern Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Many side-channel attacks also have this property. In addition, sensor eavesdropping and firmware analysis may also be considered hardware attacks [66,67]. Considering multiple case studies, Jha et al [68] indicated that microrobots with micro-electro-mechanical systems (MEMS) can forge the data in NB-IOTs.…”
Section: ) Typical Attack Technologiesmentioning
confidence: 99%
“…Many side-channel attacks also have this property. In addition, sensor eavesdropping and firmware analysis may also be considered hardware attacks [66,67]. Considering multiple case studies, Jha et al [68] indicated that microrobots with micro-electro-mechanical systems (MEMS) can forge the data in NB-IOTs.…”
Section: ) Typical Attack Technologiesmentioning
confidence: 99%
“…Next, [13] using this IoT device Danmini, Ennio, Ecobee, Philips B120N/10, Provision PT-737E, Provision PT-838, Simple Home XCS7-1002-WHT, Simple Home XCS7-1003-WHT, and Samsung SNH 1011N. Next, type of IoT device is used in toys, such as Hello Barbie, Furby Connect, Toy-Fi Teddy, and I-Que Intelligent Robot [14], [15] state that surveillance cameras are used in the experiment while [16] used Central hub, Lightbulb, Power switch, Motion sensor, Security cam for the testbed. In this journal [14], using toys that can be connected to the internet.…”
Section: Related Workmentioning
confidence: 99%
“…This device can collect the data and samples from the user devices to harm the user in multiple ways. From this paper [12], [13], [15], [16], the device that recently been attack is Ip Camera and Security Camera. There are many reasons for Ip Camera can be easily attacked by malware.…”
Section: Related Workmentioning
confidence: 99%
“…Such networking has allowed the diffusion of different Internet-of-Things (IoT) applications providing end users with innovative services. At the same time though, these networks are posing new potential threats to security and privacy [1].…”
Section: Introductionmentioning
confidence: 99%