Privacy and security in internet of things and wearable devices

O Arias, J Wurm, K Hoang, Y Jin - IEEE transactions on multi …, 2015 - ieeexplore.ieee.org
Enter the nascent era of Internet of Things (IoT) and wearable devices, where small
embedded devices loaded with sensors collect information from its surroundings, process it …

Systematically evaluating security and privacy for consumer IoT devices

F Loi, A Sivanathan, HH Gharakheili… - Proceedings of the …, 2017 - dl.acm.org
Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are
being enthusiastically adopted by consumers, with numbers projected to rise to the billions …

Privacy in internet of things: From principles to technologies

C Li, B Palanisamy - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …

Internet of things security research: A rehash of old ideas or new intellectual challenges?

E Fernandes, A Rahmati, K Eykholt… - IEEE Security & …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices,
homes, hospitals, cities, transportation, and critical infrastructure. Building security into this …

Smart IoT devices in the home: Security and privacy implications

V Sivaraman, HH Gharakheili… - IEEE Technology …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices possess network capabilities and contain at least a part of
the application logic, ie, they have the ability to perform Transmission Control …

SIFT: building an internet of safe things

CJM Liang, BF Karlsson, ND Lane, F Zhao… - Proceedings of the 14th …, 2015 - dl.acm.org
As the number of connected devices explodes, the use scenarios of these devices and data
have multiplied. Many of these scenarios, eg, home automation, require tools beyond data …

Hardware and embedded security in the context of internet of things

A Kanuparthi, R Karri, S Addepalli - … of the 2013 ACM workshop on …, 2013 - dl.acm.org
Internet of Things (IoT) is the interconnection of a large number of resource-constrained
devices such as sensors, actuators, and nodes that generate large volumes of data which …

All things considered: An analysis of {IoT} devices on home networks

D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …

[HTML][HTML] Security requirements for the internet of things: A systematic approach

S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …

Security and privacy challenges in industrial internet of things

AR Sadeghi, C Wachsmann, M Waidner - Proceedings of the 52nd …, 2015 - dl.acm.org
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …