An End-To-End View Of Iot Security And Privacy

Abstract

In this paper, we present an end-to-end view of IoT security and privacy and a case study. Our contribution is twofold. First, we present our end-to-end view of an IoT system and this view can guide risk assessment and design of an IoT system. We identify 10 basic IoT functionalities that are related to security and privacy. Based on this view, we systematically present security and privacy requirements in terms of IoT system, software, networking and big data analytics in the cloud. Second, using the end-to-end view of IoT security and privacy, we present a vulnerability analysis of the Edimax IP camera system. We are the first to exploit this system and have identified various attacks that can fully control all the cameras from the manufacturer. Our real- world experiments demonstrate the effectiveness of the discovered attacks and raise the alarms again for the IoT manufacturers.

Publication Date

7-1-2017

Publication Title

2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings

Volume

2018-January

Number of Pages

1-7

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/GLOCOM.2017.8254011

Socpus ID

85046488826 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/85046488826

This document is currently not available here.

Share

COinS