2019 17th International Conference on Privacy, Security and Trust (PST) 2019
DOI: 10.1109/pst47121.2019.8949058
|View full text |Cite
|
Sign up to set email alerts
|

Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 25 publications
0
13
1
Order By: Relevance
“…itaThreats to SHDs need not always arise from the internet; As proved by Chan et al [35] a threat actor who has access to the internal network can misuse a vulnerability for larger attacks. As pointed out by Loi et al [16], lack of vigour in fixing vulnerabilities in devices, lack of awareness among consumers about potential risks, and lack of network isolation or separate security solutions in home networks are seen as incentives by threat actors. With access to LAN, malicious actors may not only fingerprint every device using tools but also launch passive or active attacks.…”
Section: Background Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…itaThreats to SHDs need not always arise from the internet; As proved by Chan et al [35] a threat actor who has access to the internal network can misuse a vulnerability for larger attacks. As pointed out by Loi et al [16], lack of vigour in fixing vulnerabilities in devices, lack of awareness among consumers about potential risks, and lack of network isolation or separate security solutions in home networks are seen as incentives by threat actors. With access to LAN, malicious actors may not only fingerprint every device using tools but also launch passive or active attacks.…”
Section: Background Informationmentioning
confidence: 99%
“…Numerous security solutions that have evolved have focussed only on traditional computing. SHDs are the least secure of internet hosts [15] and both their widespread growth and heterogeneity have opened new and significant attack surfaces [16], [17]. Hence, the security of IoT devices is more critical than that of traditional computing devices [2], [18].…”
Section: Introductionmentioning
confidence: 99%
“…Table 1 highlights a summary of the attacks that occur in the IoT according to previous studies. Reference Attacks [12] Spoofing, Sleep deprivation, Replay, Session hijacking [13] Spyware, Trojans, Sinkhole, Spoofing, Jamming, Tag cloning, Physical tampering [14] DDoS, Botnets, Falsified sensor data, Attacks on cloud services, Physical tampering [15] DDoS, Man-in-the-Middle, Spoofing, Physical tampering, Data breach, Malware, Ransomware [16] DDoS, Man-in-the-Middle, Malware, Ransomware, Physical tampering, Data breach, Spoofing [17] Physical damage, Exhaustion attacks, Cryptanalysis, Side-channel information, Man-in-the-Middle, DoS/DDoS, Message forging [18] Physical, Malware, DoS, Man-in-the-Middle, Replication, Spoofing, Injection, Social engineering [19] DoS, Man-in-the-Middle, Malware, Physical, Password [20] DoS, Man-in-the-Middle, Physical, Malware, Botnet, Spoofing, Eavesdropping [21] DDoS, Ransomware, Industrial spying, Click fraud…”
Section: Introductionmentioning
confidence: 99%
“…Chapter 2 content is available in the proceedings of a peer-reviewed conference [36]: Content from Chapter 5 has been submitted for journal publication [33]. Parts of research involved in Chapters 4 and 5 were done in collaboration with Dr. David Barrera, who contributed through discussion and as a test coder in methodology test trials, to the development of our coding tree methodology, and was one coder for the main tagging exercise of the 1013-item IoT security advice dataset (described in Chapters 4 and 5).…”
Section: List Of Publicationsmentioning
confidence: 99%
“…In support of Section 7.3's categorization of IoT device authentication approaches, in this section we briefly identify notable challenges in adapting each category's approaches for IoT based on the initial keying material used by each (Phase 1 from Table 7.2 on page 147). The characteristics of IoT that distinguish it from IoC [36] 4…”
Section: Challenges Adapting Ioc Authentication Approaches For Iotmentioning
confidence: 99%