Smart Home, security concerns of IoT
- URL: http://arxiv.org/abs/2007.02628v1
- Date: Mon, 6 Jul 2020 10:36:11 GMT
- Title: Smart Home, security concerns of IoT
- Authors: Alessandro Ecclesie Agazzi
- Abstract summary: The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
- Score: 91.3755431537592
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The IoT (Internet of Things) has become widely popular in the domestic
environments. People are renewing their homes into smart homes; however, the
privacy concerns of owning many Internet connected devices with always-on
environmental sensors remain insufficiently addressed. Default and weak
passwords, cheap materials and hardware, and unencrypted communication are
identified as the principal threats and vulnerabilities of IoT devices.
Solutions and countermeasures are also provided: choosing a strong password,
strong authentication mechanisms, check online databases of exposed or default
credentials to mitigate the first threat; a selection of smart home devices
from reputable companies and the implementation of the SDN for the Dos/DDoS
threat; and finally IDS, HTTPS protocol and VPN for eavesdropping. The paper
concludes dealing with a further challenge, "the lack of technical support", by
which an auto-configuration approach should be analysed; this could both ease
the installation/maintenance and enhance the security in the self configuration
step of Smart Home devices.
Related papers
- Secure Supervised Learning-Based Smart Home Authentication Framework [0.7607700105031543]
A secure authentication protocol needs to be established between the smart devices and the user.
Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication.
SSL-SHAF is proposed as are liable mutual authentication that can be contextually imposed for better security.
arXiv Detail & Related papers (2024-02-01T13:01:47Z) - IoT in the Cloud: Exploring Security Challenges and Mitigations for a Connected World [18.36339203254509]
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape.
IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.
IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers.
arXiv Detail & Related papers (2024-02-01T05:55:43Z) - SunBlock: Cloudless Protection for IoT Systems [7.267200149618047]
Many existing IoT protection solutions are cloud-based, sometimes ineffective, and might share consumer data with unknown third parties.
This paper investigates the potential for effective IoT threat detection locally, on a home router, using AI tools combined with classic rule-based traffic-filtering algorithms.
Our results show that with a slight rise of router hardware resources, a typical home router instrumented with our solution is able to effectively detect risks and protect a typical home IoT network.
arXiv Detail & Related papers (2024-01-25T17:30:08Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Tamper-Evident Pairing [55.2480439325792]
Tamper-Evident Pairing (TEP) is an improvement of the Push-Button configuration (PBC) standard.
TEP relies on the Tamper-Evident Announcement (TEA), which guarantees that an adversary can neither tamper a transmitted message without being detected, nor hide the fact that the message has been sent.
This paper provides a comprehensive overview of the TEP protocol, including all information needed to understand how it works.
arXiv Detail & Related papers (2023-11-24T18:54:00Z) - SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices [67.65883495888258]
We present SyzTrust, the first state-aware fuzzing framework for vetting the security of resource-limited Trusted OSes.
SyzTrust adopts a hardware-assisted framework to enable fuzzing Trusted OSes directly on IoT devices.
We evaluate SyzTrust on Trusted OSes from three major vendors: Samsung, Tsinglink Cloud, and Ali Cloud.
arXiv Detail & Related papers (2023-09-26T08:11:38Z) - Towards Artificial General Intelligence (AGI) in the Internet of Things
(IoT): Opportunities and Challenges [55.82853124625841]
Artificial General Intelligence (AGI) possesses the capacity to comprehend, learn, and execute tasks with human cognitive abilities.
This research embarks on an exploration of the opportunities and challenges towards achieving AGI in the context of the Internet of Things.
The application spectrum for AGI-infused IoT is broad, encompassing domains ranging from smart grids, residential environments, manufacturing, and transportation to environmental monitoring, agriculture, healthcare, and education.
arXiv Detail & Related papers (2023-09-14T05:43:36Z) - 'They're all about pushing the products and shiny things rather than
fundamental security' Mapping Socio-technical Challenges in Securing the
Smart Home [1.52292571922932]
Insecure connected devices can cause serious threats not just to smart home owners, but also the underlying infrastructural network as well.
There has been increasing academic and regulatory interest in addressing cybersecurity risks from both the standpoint of Internet of Things (IoT) vendors and that of end-users.
We interviewed 13 experts in the field of IoT and identified three main categories of barriers to making IoT products usably secure.
arXiv Detail & Related papers (2021-05-25T08:38:36Z) - A Smart Home System based on Internet of Things [0.0]
Authorization and authentication are challenging IoT security operations.
This paper applies an extra layer of security of multi-factor authentication to act as a prevention method for mitigating unauthorized access.
arXiv Detail & Related papers (2020-09-11T10:34:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.