Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

A gap analysis of Internet-of-Things platforms

J Mineraud, O Mazhelis, X Su, S Tarkoma - Computer Communications, 2016 - Elsevier
We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that
provide connectivity for sensors and actuators to the Internet. To gain a widespread …

{SmartAuth}:{User-Centered} authorization for the internet of things

Y Tian, N Zhang, YH Lin, XF Wang, B Ur… - 26th USENIX Security …, 2017 - usenix.org
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps,
such as the ability to control a lock. Unfortunately, because few users act based upon, or …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database

U Chatterjee, V Govindan, R Sadhukhan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …

Hardware-based trusted computing architectures for isolation and attestation

P Maene, J Götzfried, R De Clercq… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Attackers target many different types of computer systems in use today, exploiting software
vulnerabilities to take over the device and make it act maliciously. Reports of numerous …

SANA: Secure and scalable aggregate network attestation

M Ambrosin, M Conti, A Ibrahim, G Neven… - Proceedings of the …, 2016 - dl.acm.org
Large numbers of smart connected devices, also named as the Internet of Things (IoT), are
permeating our environments (homes, factories, cars, and also our body-with wearable …

A survey on internet of things security from data perspectives

J Hou, L Qu, W Shi - Computer Networks, 2019 - Elsevier
Abstract As the Internet of Things (IoT) sees an increasing use in the society, the security
challenge it faces is becoming more and more severe. Data collected and shared in the IoT …