4.7 Article

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective

Luis Puche Rondon et al.

Summary: As technology becomes more widely available, the demand for smart devices in homes and workplaces has increased, with a focus on Enterprise Internet-of-Things (E-IoT) systems for more sophisticated applications. However, there is a lack of comprehensive research on E-IoT systems and their vulnerabilities, leading to assumptions about their security. This work aims to address this research gap by emphasizing the components, vulnerabilities, solutions, and security implications of E-IoT systems, providing a systematic analysis and highlighting areas for further research.

AD HOC NETWORKS (2022)

Article Computer Science, Information Systems

Man-in-the-middle attack against cyber-physical systems under random access protocol

Xiao-Guang Zhang et al.

Summary: This paper investigates a man-in-the-middle attack against cyber-physical systems under a random access protocol scheduling. A novel attack model is proposed to overcome protocol-induced effects, with strictly stealthy and epsilon-stealthy attacks designed to achieve optimal attack performance. The attack parameters are obtained through solving linear matrix inequalities, semi-definite programming problems, and convex optimization problems.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Friendly Fire: Cross-app Interactions in IoT Platforms

Musard Balliu et al.

Summary: This article explores the interactions between applications on IoT platforms and the potential security risks involved. By establishing a semantic framework that connects syntactic enforcement mechanisms with security concepts, it lays the groundwork for ensuring the security of IoT applications.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2021)

Proceedings Paper Computer Science, Software Engineering

Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms

Kulani Mahadewa et al.

Summary: This study delves into privacy issues in multi-party trigger-action integration platforms and proposes a dynamic testing approach TAIFU to identify privacy weaknesses. Testing on TAIPs built around the IFTTT platform revealed prevalent privacy violations, highlighting the importance of addressing these vulnerabilities.

ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (2021)

Proceedings Paper Computer Science, Information Systems

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem

Christopher Lentzsch et al.

Summary: This paper conducts a systematic analysis of the Alexa skill ecosystem, identifying limitations in the current skill vetting process and evaluating the effectiveness of skill squatting techniques. The study also investigates the prevalence of privacy policies across different categories of skills, revealing a lack of full disclosure of data types associated with requested permissions in a significant number of skills.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Proceedings Paper Computer Science, Information Systems

IoTSAFE: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery

Wenbo Ding et al.

Summary: IoT platforms provide convenience for home automation but also introduce new security challenges. IoT SAFE is a dynamic safety and security policy enforcement system that captures and manages real physical interactions among IoT devices, using static analysis and dynamic testing to identify runtime physical interactions and predict risky situations.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Article Computer Science, Information Systems

A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications

Amit Kumar Sikder et al.

Summary: The increasing popularity of smart devices has raised concerns over security threats, particularly attacks that abuse sensors on these devices. Due to the lack of proper security mechanisms, smart devices are vulnerable to sensor-based attacks which can compromise device security and privacy.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

A survey on data provenance in IoT

Rui Hu et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2020)

Article Computer Science, Hardware & Architecture

An inaudible voice attack to context-based device authentication in smart IoT systems

Jian Mao et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2020)

Article Computer Science, Information Systems

A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks

Mehrdad Salimitari et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Short Frame Structure Optimization for Industrial IoT with Heterogeneous Traffic and Shared Pilot

Jie Cao et al.

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Proceedings Paper Computer Science, Information Systems

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves

Qiben Yan et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm

Xin Xie et al.

CYBERSPACE SAFETY AND SECURITY, PT I (2020)

Proceedings Paper Computer Science, Hardware & Architecture

IOTGAZE: IoT Security Enforcement via Wireless Context Analysis

Tianbo Gu et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds

Yan Jia et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling

Haotian Chi et al.

2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020) (2020)

Article Computer Science, Information Systems

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Mohammed Ali Al-Garadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Engineering, Electrical & Electronic

AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication

Samuel Marchal et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Securing IoT Apps

Musard Balliu et al.

IEEE SECURITY & PRIVACY (2019)

Article Computer Science, Theory & Methods

SAFECHAIN: Securing Trigger-Action Programming From Attack Chains

Kai-Hsiang Hsu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Review Computer Science, Theory & Methods

A Systematic Review for Smart City Data Analytics

Vaia Moustaka et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

Jehad M. Hamamreh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

AutoTap: Synthesizing and Repairing Trigger-Action Programs Using LTL Properties

Lefan Zhang et al.

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Misbinding Attacks on Secure Device Pairing and Bootstrapping

Mohit Sethi et al.

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Proceedings Paper Computer Science, Theory & Methods

Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home

Sarah Prange et al.

2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2019)

Proceedings Paper Computer Science, Software Engineering

Achieving Consistency of Software Updates against Strong Attackers

Lamya Abdullah et al.

THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Charting the Attack Surface of Trigger-Action IoT Platforms

Qi Wang et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Theory & Methods

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems

Nan Zhang et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

T. J. OConnor et al.

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)

Proceedings Paper Computer Science, Theory & Methods

DeviceMien: Network Device Behavior Modeling for Identifying Unknown IoT Devices

Jorge Ortiz et al.

PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19) (2019)

Proceedings Paper Computer Science, Cybernetics

How Users Interpret Bugs in Trigger-Action Programming

Will Brackenbury et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Article Computer Science, Hardware & Architecture

DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

Seyed Farhad Aghili et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Theory & Methods

Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

IoT Goes Nuclear: Creating a Zigbee Chain Reaction

Eyal Ronen et al.

IEEE SECURITY & PRIVACY (2018)

Article Telecommunications

A survey on communication components for IoT-based technologies in smart homes

A. A. Zaidan et al.

TELECOMMUNICATION SYSTEMS (2018)

Proceedings Paper Computer Science, Information Systems

An overview of potential authentication threats and attacks on Internet of Things(IoT): A focus on Smart home applications.

Attlee M. Gamundani et al.

IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY (2018)

Proceedings Paper Computer Science, Hardware & Architecture

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment

Yan Meng et al.

PROCEEDINGS OF THE 2018 THE NINETEENTH INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '18) (2018)

Proceedings Paper Computer Science, Theory & Methods

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic

Wei Zhang et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

On the Safety of IoT Device Physical Interaction Control

Wenbo Ding et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Hardware & Architecture

BF-IoT: Securing the IoT Networks via Fingerprinting-based Device Authentication

Tianbo Gu et al.

2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS) (2018)

Proceedings Paper Computer Science, Hardware & Architecture

IOTSAN: Fortifying the Safety of IoT Systems

Dang Tu Nguyen et al.

CONEXT'18: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (2018)

Article Computer Science, Artificial Intelligence

A statistical unsupervised method against false data injection attacks: A visualization-based approach

Mostafa Mohammadpourfard et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Article Computer Science, Information Systems

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Yiliang Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Review Computer Science, Hardware & Architecture

Internet of Things security: A survey

Fadele Ayotunde Alaba et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things

Manuel Lopez-Martin et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System

Zhen Ling et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Information Systems

DolphinAttack: Inaudible Voice Commands

Guoming Zhang et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting

Zain Shamsi et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Secure Smart Homes: Opportunities and Challenges

Jordi Mongay Batalla et al.

ACM COMPUTING SURVEYS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Software-Defined Edge Defense Against IoT-Based DDoS

Mert Ozcelik et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT) (2017)

Proceedings Paper Computer Science, Information Systems

ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms

Yunhan Jack Jia et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Continuous Authentication for Voice Assistants

Huan Feng et al.

PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17) (2017)

Proceedings Paper Computer Science, Information Systems

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis

Claude Fachkha et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Engineering, Electrical & Electronic

Secure Firmware Validation and Update for Consumer Devices in Home Networking

Byung-Chul Choi et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)

Article Engineering, Electrical & Electronic

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou et al.

PROCEEDINGS OF THE IEEE (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Smart-Phones Attacking Smart-Homes

Vijay Sivaraman et al.

PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16) (2016)

Proceedings Paper Computer Science, Theory & Methods

Security Analysis of Emerging Smart Home Applications

Earlence Fernandes et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Proceedings Paper Computer Science, Theory & Methods

Extended Functionality Attacks on IoT Devices: The Case of Smart Lights (Invited Paper)

Eyal Ronen et al.

1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (2016)

Proceedings Paper Computer Science, Information Systems

Smart Locks: Lessons for Securing Commodity Internet of Things Devices

Grant Ho et al.

ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Hardware & Architecture

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Hardware & Architecture

An end-to-end secure key management protocol for e-health applications

Mohammed Riyadh Abdmeziem et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Computer Science, Theory & Methods

A lightweight attribute-based encryption scheme for the Internet of Things

Xuanxia Yao et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Information Systems

Garage Door Openers: An Internet of Things Case Study

Jonathan Margulies

IEEE SECURITY & PRIVACY (2015)

Article Computer Science, Theory & Methods

An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems

Qi Xiong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures

Nikos Komninos et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Information Flow Control for Secure Cloud Computing

Jean Bacon et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2014)

Article Telecommunications

A Survey on Near Field Communication (NFC) Technology

Vedat Coskun et al.

WIRELESS PERSONAL COMMUNICATIONS (2013)

Proceedings Paper Computer Science, Theory & Methods

Stacking the Deck Attack on Software Updates: Solution by Distributed Recommendation of Testers

Khalid Alhamed et al.

2013 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY (IAT 2013) (2013)

Proceedings Paper Computer Science, Hardware & Architecture

Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) AttacksE

Shadi Esnaashari et al.

2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) (2013)

Article Computer Science, Theory & Methods

Secure Communication Over Parallel Relay Channel

Zohaib Hassan Awan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Engineering, Electrical & Electronic

Physical Layer Authentication over MIMO Fading Wiretap Channels

Paolo Baracca et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Review Computer Science, Hardware & Architecture

A survey on security issues in service delivery models of cloud computing

S. Subashini et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Theory & Methods

Software model checking

Ranjit Jhala et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Information Systems

A Survey on Jamming Attacks and Countermeasures in WSNs

Aristides Mpitziopoulos et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)

Article Engineering, Electrical & Electronic

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)