2021
DOI: 10.1109/jiot.2021.3059457
|View full text |Cite
|
Sign up to set email alerts
|

Reviewing IoT Security via Logic Bugs in IoT Platforms and Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Blockchain technology has the potential to significantly enhance the value of existing IoT capabilities by incorporating cryptographic techniques and addressing security and trustworthiness issues in large-scale IoT systems [ 13 ]. It is likely that blockchain technology will be utilized to record sensor readings from the internet of things in order to prevent data manipulation and fabrication.…”
Section: Issues With Cloud Based Aiotsmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain technology has the potential to significantly enhance the value of existing IoT capabilities by incorporating cryptographic techniques and addressing security and trustworthiness issues in large-scale IoT systems [ 13 ]. It is likely that blockchain technology will be utilized to record sensor readings from the internet of things in order to prevent data manipulation and fabrication.…”
Section: Issues With Cloud Based Aiotsmentioning
confidence: 99%
“…Because of the possibility that data supplied by specific Agriculture partners may have been tampered with or altered by attackers or the owner of the data in conventional AIoT networks, such data may not be trustworthy. In the context of AIoT networks, there is widespread consensus that data verification methods should be implemented in different scenarios [ [13] , [14] , [15] ].…”
Section: Introductionmentioning
confidence: 99%
“…We also assume that some compromised devices in the IoT deployment might be trying to perform lateral movement to weaponize other devices or trying to access exposed services illicitly. We also consider attacks attempting to impersonate legitimate IoT devices through identity spoofing and MiTM attacks exploiting the lack of mutual authentication and certificate validation [2].…”
Section: Threat Modelmentioning
confidence: 99%
“…As a result, the number of IoT-connected low-cost devices is expected to rise over the coming years and reach 30.2 billion by 2027 [1]. Indeed, the harsh time-to-market race, along with the limited technical support, leaves the IoT devices and their Internet-exposed services marred by a wide variety of logical bugs (e.g., weak authentication and unauthorized access), software vulnerabilities, and poor default configuration settings [2]- [6]. As a matter of fact, over 60% of the IoT device Common Vulnerabilities and Exposures (CVE) documented during the last half of 2022 were remotely exploitable [7].…”
Section: Introductionmentioning
confidence: 99%
“…Liang and Kim [2] conducted research on IoT security, discussed applications in edge computing and blockchain scenarios, and pointed out that machine learning may be a better solution. Regarding IoT platforms and systems, Zhou [3] discussed the lessons learned from these bugs. Miloslavskaya and Tolstoy [4] were concerned about the typical attack problems of IoT assets, and they proposed to find possible security vulnerabilities through intelligent security protection of the Internet of things.…”
Section: Introductionmentioning
confidence: 99%