Defending Internet of Things against Exploits

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks no...

Full description

Saved in:
Bibliographic Details
Published inRevista IEEE América Latina Vol. 13; no. 4; pp. 1112 - 1119
Main Authors Augusto Teixeira, Fernando, Menezes Vieira, Gustavo, Marcondes Fonseca, Pablo, Magno Quintao Pereira, Fernando, Chi Wong, Hao, Marcos Silva Nogueira, Jose, Barbosa Oliveira, Leonardo
Format Journal Article
LanguageEnglish
Published Los Alamitos IEEE 01.04.2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1548-0992
1548-0992
DOI:10.1109/TLA.2015.7106364