Loading…

Defending Internet of Things against Exploits

The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks no...

Full description

Saved in:
Bibliographic Details
Published in:Revista IEEE América Latina 2015-04, Vol.13 (4), p.1112-1119
Main Authors: Augusto Teixeira, Fernando, Menezes Vieira, Gustavo, Marcondes Fonseca, Pablo, Magno Quintao Pereira, Fernando, Chi Wong, Hao, Marcos Silva Nogueira, Jose, Barbosa Oliveira, Leonardo
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
ISSN:1548-0992
1548-0992
DOI:10.1109/TLA.2015.7106364