2017 IST-Africa Week Conference (IST-Africa) 2017
DOI: 10.23919/istafrica.2017.8102372
|View full text |Cite
|
Sign up to set email alerts
|

Beyond the convenience of the internet of things: Security and privacy concerns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…This is in contrast to time tested protocols, like the TCP/IP suite, that more traditional internetworking devices are built upon. Moganedi & Mtsweni [8] outlined that while IoT devices can introduce great convenience into human life, if the mass amount of personal data that can be collected are not secured or improperly protected against being leaked, any desire to adopt or use such technology will wane and the potential and the ability of what IoT devices can do will be less explored.…”
Section: Security Concerns In Iot Based Networkmentioning
confidence: 99%
“…This is in contrast to time tested protocols, like the TCP/IP suite, that more traditional internetworking devices are built upon. Moganedi & Mtsweni [8] outlined that while IoT devices can introduce great convenience into human life, if the mass amount of personal data that can be collected are not secured or improperly protected against being leaked, any desire to adopt or use such technology will wane and the potential and the ability of what IoT devices can do will be less explored.…”
Section: Security Concerns In Iot Based Networkmentioning
confidence: 99%
“…The rapid proliferation of insecure IoT devices and ease by which attackers can locate them using online services, such as shodan, provides an ever expanding pool of attack resources. By comprising and leveraging multitudes of these vulnerable IoT devices, attackers can now perform large scale attacks such as spamming, phishing and Distributed Denial of Service (DDoS), against resources on the Internet [5].…”
Section: Introductionmentioning
confidence: 99%
“…The rapid proliferation of insecure IoT devices and ease by which attackers can locate them using online services, such as shodan [5], provides an ever-expanding pool of attack resources. By comprising multitudes of these vulnerable IoT devices, attackers can now perform large-scale attacks such as spamming, phishing and Distributed Denial of Service (DDoS), against resources on the Internet [6].…”
Section: Introductionmentioning
confidence: 99%