Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

Access control in Internet-of-Things: A survey

S Ravidas, A Lekidis, F Paci, N Zannone - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …

Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019 - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms

W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao… - 28th USENIX security …, 2019 - usenix.org
A smart home connects tens of home devices to the Internet, where an IoT cloud runs
various home automation applications. While bringing unprecedented convenience and …

Situational access control in the internet of things

R Schuster, V Shmatikov, E Tromer - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Access control in the Internet of Things (IoT) often depends on a situation---for example," the
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …

A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …

[HTML][HTML] A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions

O Popoola, M Rodrigues, J Marchang… - Blockchain: Research …, 2023 - Elsevier
Protecting private data in smart homes, a popular Internet-of-Things (IoT) application,
remains a significant data security and privacy challenge due to the large-scale …

Privacy enhancing technologies in the Internet of Things: Perspectives and challenges

SC Cha, TY Hsu, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …

Cross-app interference threats in smart homes: Categorization, detection and handling

H Chi, Q Zeng, X Du, J Yu - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Internet of Thing platforms prosper home automation applications (apps). Prior research
concerns intra-app security. Our work reveals that automation apps, even secured …