Automated Security Analysis for Real-World IoT Devices
Abstract
References
Recommendations
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
AbstractNowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐...
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
Highlights- Definition of a library of primitives to model security communication protocols.
- Definition of a set of schema for temporal logic formulas to specify confidentiality, integrity and authentication properties and verify protocol security ...
AbstractIoT (Internet of Things) devices are extensively used in security-critical services, as for example home door opening, gas monitoring, alarm systems, etc. Often, they use communication protocols with no standardisation and no security guarantee. ...
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
AbstractThe term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/60e31793-1a26-42c5-917e-edfb7f0e81e3/3623652.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 297Total Downloads
- Downloads (Last 12 months)297
- Downloads (Last 6 weeks)45
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in