Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security 2015
DOI: 10.1145/2732209.2732216
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security & Privacy

Abstract: The era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent of IoT, most security threats were just related to information leakage and the loss of service. With IoT, security threats have become closely related to our nonvirtual lives and they can directly influence physical security risk.The Internet of Things consists… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 102 publications
(17 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Hwang [22] also raises the well-known concern regarding the security threats related to IoT, for example the possibility to overwhelm a system by means of a few IoT attackers using Denial-of-Service (DoS)-based attacks [23]. The most remarkable point from this paper's perspective is that, as Hwang states, a demand exists for security solutions capable of supporting multi-profile platforms with different security levels.…”
Section: Security and Privacy In Iotmentioning
confidence: 93%
“…Hwang [22] also raises the well-known concern regarding the security threats related to IoT, for example the possibility to overwhelm a system by means of a few IoT attackers using Denial-of-Service (DoS)-based attacks [23]. The most remarkable point from this paper's perspective is that, as Hwang states, a demand exists for security solutions capable of supporting multi-profile platforms with different security levels.…”
Section: Security and Privacy In Iotmentioning
confidence: 93%
“…In a centralized IIoT system, a user's confidential data are stored inside a traditional server,; however, in the case of a large-scale IIoT system, sensitive information can also be stored in distributed locations. Therefore, IIoT systems experence issues, e.g., protecting business's confidential information and individual confidential information [105,106] One of the common ways to get a user's confidential and private information (e.g., username, password, bank details, etc.) unlawfully is a phishing attack.…”
Section: Security Issue 8-data Confidentialitymentioning
confidence: 99%
“…Any natural hazard that affects the functionality of data handling or any man-made intervention can cause a high risk of U-cities normal functionality. For example, any untrusted information is a potential risk from the privacy security of individuals, to company finance or even the economy of global markets [91], [92]. Cyberattacks on the IoT network can make physical damage and it can be fatal, especially the applications in the industrial sector [50].…”
Section: Vulnerability Assessment Of Citesmentioning
confidence: 99%