2011
DOI: 10.1007/978-3-642-21599-5_16
|View full text |Cite
|
Sign up to set email alerts
|

Home-Network Threats and Access Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…However, using NAT alone does not provide a comprehensive solution to prevent exposure of ROS traffic to the Internet. In general, NAT is not a security apparatus: an internal host that makes external connections can still leak data, and NAT implementations can be misconfigured or, in some cases, exploited to open ports for outside access [4,9,19]. As one example, our Baxter robot was found in our scan results because the ROS master port for its lab was forwarded to its address.…”
Section: Recommendations For Improved Securitymentioning
confidence: 99%
“…However, using NAT alone does not provide a comprehensive solution to prevent exposure of ROS traffic to the Internet. In general, NAT is not a security apparatus: an internal host that makes external connections can still leak data, and NAT implementations can be misconfigured or, in some cases, exploited to open ports for outside access [4,9,19]. As one example, our Baxter robot was found in our scan results because the ROS master port for its lab was forwarded to its address.…”
Section: Recommendations For Improved Securitymentioning
confidence: 99%
“…Before accessing restricted services or resources, devices must first be paired with each other. As explained by Baugher and Lortz [12], device pairing uses the same mechanisms as WiFi Protected Setup (WPS) and avoids exposing the underlying PKI to the user. In order to enforce the principle of least privilege, UPnP-DP uses three roles: Public, Basic, and Admin.…”
Section: Related Workmentioning
confidence: 99%
“…We use data from existing analyses [15,12,16] as well as threats discovered as part of the webinos project [17] which are relevant to home or personal scenarios. We ignore issues commonly dealt with at lower layers in the communication stack, such as communication jamming, as well as potential weaknesses in standard cryptography.…”
Section: Personal Network Definition and Threatsmentioning
confidence: 99%
See 1 more Smart Citation