An overview of security in CoAP: attack and analysis

S Arvind, VA Narayanan - 2019 5th international conference on …, 2019 - ieeexplore.ieee.org
Over the last decade, a technology called Internet of Things (IoT) has been evolving at a
rapid pace. It enables the development of endless applications in view of availability of …

Burglars' iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds

Y Jia, L Xing, Y Mao, D Zhao, XF Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
With the increasing popularity of the Internet of Things (IoT), many IoT cloud platforms have
emerged to help the IoT manufacturers connect their devices to their users. Serving the …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

Mixed certificate chains for the transition to post-quantum authentication in TLS 1.3

S Paul, Y Kuzovkova, N Lahr… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Large-scale quantum computers will be able to efficiently solve the underlying mathematical
problems of widely deployed public key cryptosystems in the near future. This threat has …

Transparent end-to-end security for publish/subscribe communication in cyber-physical systems

M Dahlmanns, J Pennekamp, IB Fink… - Proceedings of the …, 2021 - dl.acm.org
The ongoing digitization of industrial manufacturing leads to a decisive change in industrial
communication paradigms. Moving from traditional one-to-one to many-to-many …

MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers

A Palmieri, P Prem, S Ranise… - 2019 IEEE World …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is radically changing the way people live and interact with
society: ranging from wearables to smart cities, the number of IoT devices has grown …

Gotham testbed: a reproducible IoT testbed for security experiments and dataset generation

X Sáez-de-Cámara, JL Flores… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The growing adoption of the Internet of Things (IoT) has brought a significant increase in
attacks targeting those devices. Machine learning (ML) methods have shown promising …

Leveraging operational technology and the Internet of things to attack smart buildings

DR dos Santos, M Dagrada, E Costante - Journal of Computer Virology …, 2021 - Springer
In recent years, the buildings where we spend most part of our life are rapidly evolving. They
are becoming fully automated environments where energy consumption, access control …

End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption

S Lin, L Cui, N Ke - Sensors, 2024 - mdpi.com
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study
introduces an improved end-to-end encryption approach using conditional proxy re …

Program-aware fuzzing for MQTT applications

LG Araujo Rodriguez, D Macêdo Batista - Proceedings of the 29th ACM …, 2020 - dl.acm.org
Over the last few years, MQTT applications have been widely exposed to vulnerabilities
because of their weak protocol implementations. For our preliminary research, we …