2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

IoT Goes Nuclear: Creating a ZigBee Chain Reaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 315 publications
(32 citation statements)
references
References 9 publications
0
27
0
1
Order By: Relevance
“…With the rapid growth of the IoT (see Figure 2) also concerns have been raised that without appropriate considerations many new security challenges arise. In particular, as the IoT is interconnected and spreads widely, cyber attacks are an emerging threat [9,31,39,47]. Therefore, researchers from academia and industry are analysing the security aspects of IoT systems [48].…”
Section: Research Gap and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With the rapid growth of the IoT (see Figure 2) also concerns have been raised that without appropriate considerations many new security challenges arise. In particular, as the IoT is interconnected and spreads widely, cyber attacks are an emerging threat [9,31,39,47]. Therefore, researchers from academia and industry are analysing the security aspects of IoT systems [48].…”
Section: Research Gap and Related Workmentioning
confidence: 99%
“…Often this mathematical analysis targets detailed aspects of the underlying encryption schemes, protocols, and hardware used in IT system architectures. The importance of a detailed security analysis of the primitives of encryption schemes and security protocols are highlighted in the case of many recent attacks on IoT systems [47]. Recently, also many international standards and even well studied primitives have been broken.…”
Section: Security Analysismentioning
confidence: 99%
“…Ability of IoT devices to connect and communicate among themselves allows IoT systems to deal with a variety of complex operations that exceed the constrained resources of individual IoT devices. However, the limited capabilities of the IoT devices to adopt traditional security techniques exposes IoT systems to a huge number of potential attacks [2], [3], [4]. Thus, a security mechanism that guarantees the secure interaction between devices plays a key role in establishing trust in an IoT system.…”
Section: Introductionmentioning
confidence: 99%
“…Many of these fall into the category of non-invasive attacks, which can be performed without direct physical contact with components within the device. Attacks that exploit leakage of key-dependent information can lead to disastrous scenarios in which the master key used to encrypt and authenticate device firmware becomes compromised [RSWO17].…”
Section: Introductionmentioning
confidence: 99%