Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

IoT privacy and security challenges for smart home environments

H Lin, NW Bergmann - Information, 2016 - mdpi.com
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed
solutions intended to be applied across a wide range of applications. However, the privacy …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …
N Apthorpe, DY Huang, D Reisman… - arxiv preprint arxiv …, 2018 - arxiv.org
The proliferation of smart home Internet of Things (IoT) devices presents unprecedented
challenges for preserving privacy within the home. In this paper, we demonstrate that a …

IKP: Turning a PKI around with decentralized automated incentives

S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …