IEEE INFOCOM 2018 - IEEE Conference on Computer Communications 2018
DOI: 10.1109/infocom.2018.8486369
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(24 citation statements)
references
References 9 publications
0
21
0
3
Order By: Relevance
“…Therefore, consuming considerable amount of time. Luo et al [17], proposed a technique that performs reverse engineering of IoT protocols, to identify the message format of [18] verified the effectiveness graph-based analysis on a smart home system prototype. The prototype consisted of a smartphone controlling a smart light pulp and a Google home speaker.…”
Section: Detecting Iot Network Vulnerabilitiesmentioning
confidence: 98%
“…Therefore, consuming considerable amount of time. Luo et al [17], proposed a technique that performs reverse engineering of IoT protocols, to identify the message format of [18] verified the effectiveness graph-based analysis on a smart home system prototype. The prototype consisted of a smartphone controlling a smart light pulp and a Google home speaker.…”
Section: Detecting Iot Network Vulnerabilitiesmentioning
confidence: 98%
“…There are also many complex models based on mathematical theories solving network vulnerabilities. An idea proposed in [155] was based on a novel graph mechanism that analyzed the network traffics to show weak elements of IoT infrastructure. In [156] was proposed a gateway system that controls the networking domain of IoT home infrastructure.…”
Section: B Security In Data Managementmentioning
confidence: 99%
“…3). Android's container-based Keystore system 8 supports the protection of private keys used to authenticate the MMEEs to the LMM. Furthermore, if not embedded in the OS, we assume that MMEEs are only installed from official sources, e. g., Google Play Store, to restrict the deployment of modified implementations.…”
Section: A Implementation and General Set-upmentioning
confidence: 99%
“…1) Effectiveness: We evaluate DEMONS' effectiveness using existing smart home attacks identified by [8] and relying on our attacker model (cf. Sec.…”
Section: B Security Evaluationmentioning
confidence: 99%