An End-To-End View Of Iot Security And Privacy
Abstract
In this paper, we present an end-to-end view of IoT security and privacy and a case study. Our contribution is twofold. First, we present our end-to-end view of an IoT system and this view can guide risk assessment and design of an IoT system. We identify 10 basic IoT functionalities that are related to security and privacy. Based on this view, we systematically present security and privacy requirements in terms of IoT system, software, networking and big data analytics in the cloud. Second, using the end-to-end view of IoT security and privacy, we present a vulnerability analysis of the Edimax IP camera system. We are the first to exploit this system and have identified various attacks that can fully control all the cameras from the manufacturer. Our real- world experiments demonstrate the effectiveness of the discovered attacks and raise the alarms again for the IoT manufacturers.
Publication Date
7-1-2017
Publication Title
2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings
Volume
2018-January
Number of Pages
1-7
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/GLOCOM.2017.8254011
Copyright Status
Unknown
Socpus ID
85046488826 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85046488826
STARS Citation
Ling, Zhen; Liu, Kaizheng; Xu, Yiling; Jin, Yier; and Fu, Xinwen, "An End-To-End View Of Iot Security And Privacy" (2017). Scopus Export 2015-2019. 6606.
https://stars.library.ucf.edu/scopus2015/6606