2020 IEEE Security and Privacy Workshops (SPW) 2020
DOI: 10.1109/spw50608.2020.00033
|View full text |Cite
|
Sign up to set email alerts
|

Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices

Abstract: Internet-of-Things (IoT) devices implement weak authentication and access control schemes. The on-demand nature of IoT devices requires a responsive communications channel, which is often at odds with thorough authentication and access control. This paper seeks to better understand IoT device security by examining the design of authentication and access control schemes. In this work, we explore the challenge of propagating credential revocation and access control list modifications in a shared IoT ecosystem. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…More recently, scholars such as Leitão (2019), Slupska (2019), andJanes et al (2020) have added to this burgeoning, IoT-specific literature and helped to uncover why in-home privacy security threats deriving from smart systems require closer attention. For instance, in many cases the usability of smart devices is limited due to the restricted user interface that is available, and proposed security and privacy recommendations often conflict with each other when examined across the three different abuse phases (i.e., physical control, escape, life apart) (Alshehri et al, 2020;Matthews et al, 2017;.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, scholars such as Leitão (2019), Slupska (2019), andJanes et al (2020) have added to this burgeoning, IoT-specific literature and helped to uncover why in-home privacy security threats deriving from smart systems require closer attention. For instance, in many cases the usability of smart devices is limited due to the restricted user interface that is available, and proposed security and privacy recommendations often conflict with each other when examined across the three different abuse phases (i.e., physical control, escape, life apart) (Alshehri et al, 2020;Matthews et al, 2017;.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, in many cases the usability of smart devices is limited due to the restricted user interface that is available, and proposed security and privacy recommendations often conflict with each other when examined across the three different abuse phases (i.e., physical control, escape, life apart) (Alshehri et al, 2020;Matthews et al, 2017;. Besides, devices often suffer from flaws that enable unauthorised access, with such a deficiency of transparency endangering particularly vulnerable groups and communities (Janes et al, 2020). In addition, researchers exposed a lack of awareness on IoT-facilitated tech abuse across support services such as voluntary sector organisations like refuges and charities, and statutory service bodies such as law enforcement (Mayhew and Jahankhani, 2020;Tanczer et al, 2018b), which limits the support affected victims/survivors can expect.…”
Section: Introductionmentioning
confidence: 99%
“…The increasing drive to expand the connectivity of devices and provide centralised hubs such as smart speakers creates nodes that are "information goldmines" for perpetrators. In addition, research has shown that IoT manufacturers do not provide transparency and the necessary prompts to flag up to IoT device users the breadth of connections and access controls they have agreed to (Janes et al, 2020;Parkin et al, 2019). People may not remember with whom they have shared credentials, and they may have no easy way of checking this which can provide avenues for abusers to continue to spy on their family or ex-partner covertly and over an extended period of time.…”
Section: Centralisationmentioning
confidence: 99%
“…Previous studies have indicated a range of interventions that device manufacturers can implement to improve the usability of IoT devices in ways that will benefit victims and survivors. These include suggestions mentioned above, plus more accessible and navigable user interfaces, improvements to the usability of privacy and security controls, enforced authentication requirements, and the ability to review historical queries and actions (Janes et al, 2020;Parkin et al, 2019;Leitão, 2019).…”
Section: Usabilitymentioning
confidence: 99%
See 1 more Smart Citation