Experiments with security and privacy in IoT networks
OCT 29, 2015 19:05 PM
A+ A A-
Experiments with security and privacy in IoT networks

Experiments with security and privacy in IoT networks

Mary R. Schurgot, LGS Innovations, LLC, Florham Park, New Jersey, USA
David A. Shinberg, LGS Innovations, LLC, Florham Park, New Jersey, USA
Lloyd G. Greenwald, LGS Innovations, LLC, Florham Park, New Jersey, USA

We explore the risks to security and privacy in IoT networks by setting up an inexpensive home automation network and performing a set of experiments intended to study attacks and defenses. We focus on privacy preservation in home automation networks but our insights can extend to other IoT applications. Privacy preservation is fundamental to achieving the promise of IoT, Industrial Internet and M2M. We look at both simple cryptographic techniques and information manipulation to protect a user against an adversary inside the IoT network or an adversary that has compromised remote servers. We show how user data can be masked or selectively leaked and manipulated. We provide a blueprint for inexpensive study of IoT security and privacy using COTS products and services.

Read full article

FIRST
PREV
NEXT
LAST
Page(s):
[%= name %]
[%= createDate %]
[%= comment %]
Share this:
Please login to enter a comment:
 

Computing Now Blogs
Business Intelligence
by Keith Peterson
Cloud Computing
A Cloud Blog: by Irena Bojanova
The Clear Cloud: by STC Cloud Computing
Careers
Computing Careers: by Lori Cameron
Display Technologies
Enterprise Solutions
Enterprise Thinking: by Josh Greenbaum
Healthcare Technologies
The Doctor Is In: Dr. Keith W. Vrbicky
Heterogeneous Systems
Hot Topics
NealNotes: by Neal Leavitt
Industry Trends
The Robotics Report: by Jeff Debrosse
Internet Of Things
Sensing IoT: by Irena Bojanova

 

RESET