2020
DOI: 10.3390/fi12030048
|View full text |Cite
|
Sign up to set email alerts
|

Smart Devices Security Enhancement via Power Supply Monitoring

Abstract: The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices’ operation. Considering that most IoT devices are of low cost and are used for various tasks, such as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 21 publications
(21 reference statements)
0
5
0
Order By: Relevance
“…Along with the concern for the safety of civilians, and their devices, these IoT devices can also be used as potential botnets to attack major digital infrastructures. Several such successful attacks have been reported and there has been an exponential increase in the number of attacks on the IoT every year [12]. Therefore, keeping these repercussions in mind, security testing of IoT devices is what is relevant and Above Figure 1 represents the connections between the components surrounding the architecture of smart homes.…”
Section: Api (Application Protocol Interface)mentioning
confidence: 99%
“…Along with the concern for the safety of civilians, and their devices, these IoT devices can also be used as potential botnets to attack major digital infrastructures. Several such successful attacks have been reported and there has been an exponential increase in the number of attacks on the IoT every year [12]. Therefore, keeping these repercussions in mind, security testing of IoT devices is what is relevant and Above Figure 1 represents the connections between the components surrounding the architecture of smart homes.…”
Section: Api (Application Protocol Interface)mentioning
confidence: 99%
“…Therefore, the data flow and data end-to-end delay at the network node can be used as one of the basis of network intrusion detection. The following is an analysis of the network intrusion detection method in this article [25].…”
Section: Data Feature Extractionmentioning
confidence: 99%
“…Finally, the works in [9][10][11][12] by Myridakis et al study physical features, such as uninterrupted power supply and extract information that, in combination with thresholds or ranges of values, detects irregularities in IoT devices. These are the first attempts to implement an autonomous system capable of providing enhanced security at low-cost.…”
Section: Related Workmentioning
confidence: 99%
“…This article is an extension of the work [9][10][11][12] in conjunction with [13] and presents the exploitation of the SCA approach [14] for security reasons (white hacking). Initially, it applies SCA for monitoring the power dissipation of a targeted IoT device, capturing its electrical behavior and transforming it to data.…”
Section: Introductionmentioning
confidence: 99%