Survey of Authentication and Authorization for the Internet of Things

M Trnka, T Cerny, N Stickney - Security and Communication …, 2018 - Wiley Online Library
The Internet of Things is currently getting significant interest from the scientific community.
Academia and industry are both focused on moving ahead in attempts to enhance usability …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …

All things considered: An analysis of {IoT} devices on home networks

D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic

X de Carné de Carnavalet, PC van Oorschot - ACM Computing Surveys, 2023 - dl.acm.org
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees
that improve end-user security and privacy. While TLS helps defend against pervasive …

Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

Sok: Privacy-enhancing smart home hubs

I Zavalyshyn, A Legay, A Rath… - Proceedings on Privacy …, 2022 - petsymposium.org
Smart homes are IoT systems enabling the automation of household operation. The
unrestricted collection and processing of data by smart home systems raises legitimate …

IoTCom: Dissecting Interaction Threats in IoT Systems

M Alhanahnah, C Stevens, B Chen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Due to the growing presence of Internet of Things (IoT) apps and devices in smart homes
and smart cities, there are more and more concerns about their security and privacy risks …

End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

S Lin, L Cui, N Ke - Sensors, 2024 - mdpi.com
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study
introduces an improved end-to-end encryption approach using conditional proxy re …