DocumentCode
62574
Title
Defending Internet of Things against Exploits
Author
Teixeira, F.A. ; Machado, G.V. ; Fonseca, P.M. ; Pereira, F.M.Q. ; Wong, H.C. ; Nogueira, J.M.S. ; Oliveira, L.B.
Author_Institution
UFMG, Belo Horizonte, Brazil
Volume
13
Issue
4
fYear
2015
fDate
Apr-15
Firstpage
1112
Lastpage
1119
Abstract
The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT´s demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT´s idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
Keywords
Internet of Things; computer network security; Internet of Things; IoT system; pinpoint vulnerabilities; tailor-made security solutions; thwarting attacks; Buffer overflows; Context; Internet of things; Security; Servers; TV; Buffer Overflow; Code Security; Internet of Things;
fLanguage
English
Journal_Title
Latin America Transactions, IEEE (Revista IEEE America Latina)
Publisher
ieee
ISSN
1548-0992
Type
jour
DOI
10.1109/TLA.2015.7106364
Filename
7106364
Link To Document