Living in the Internet of Things: Cybersecurity of the IoT - 2018 2018
DOI: 10.1049/cp.2018.0030
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(33 citation statements)
references
References 2 publications
0
30
0
Order By: Relevance
“…First, cryptographic keys or certificates cannot be efficiently distributed due to the limited computing power leading to weak authentication [1]. Second, default keys or credentials can be brute-forced by high-computing-power attackers, extracted from device firmware or mobile apps, or intercepted at login [2]. Third, the ID number such as MAC address in the header needs extra spectral or power resources, which is limited in IoT applications, to be transmitted [3].…”
Section: Introductionmentioning
confidence: 99%
“…First, cryptographic keys or certificates cannot be efficiently distributed due to the limited computing power leading to weak authentication [1]. Second, default keys or credentials can be brute-forced by high-computing-power attackers, extracted from device firmware or mobile apps, or intercepted at login [2]. Third, the ID number such as MAC address in the header needs extra spectral or power resources, which is limited in IoT applications, to be transmitted [3].…”
Section: Introductionmentioning
confidence: 99%
“…While IoT has many potential benefits across domains, from security perspective, it also provides a lucrative motivation to the attackers [6]. These motivations are graphically presented in Fig.2 [6].It may be assumed that an attacker may consider these motivations as an opportunity to exploit the same for malicious intent [6]. The goals of the attackers may include [13]: DDoS attack on internet, breach of privacy, extortion from the users, forging of critical data, illegal data mining, or coordinated attack like cyber warfare.…”
Section: Vulnerabilities and Their Expolits In Iotmentioning
confidence: 99%
“…The deployment of IoT in smart environment stems from objectives of a typical smart city required for e-governance. These may include [6]:a) Optimization of Public services like traffic flow, parking, garbage management, city-lighting, surveillance of hospitals, schools and other public areas, b) Optimization of resources like water supply management, electricity management, allocation of civic staff etc; c) Traffic Management for reduction in congestion , d) Monitoring of City Environment viz. Air Quality index monitoring, pollution monitoring etc; e) Better and Transparent Government viz.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations