DocumentCode :
62574
Title :
Defending Internet of Things against Exploits
Author :
Teixeira, F.A. ; Machado, G.V. ; Fonseca, P.M. ; Pereira, F.M.Q. ; Wong, H.C. ; Nogueira, J.M.S. ; Oliveira, L.B.
Author_Institution :
UFMG, Belo Horizonte, Brazil
Volume :
13
Issue :
4
fYear :
2015
fDate :
Apr-15
Firstpage :
1112
Lastpage :
1119
Abstract :
The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT´s demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT´s idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
Keywords :
Internet of Things; computer network security; Internet of Things; IoT system; pinpoint vulnerabilities; tailor-made security solutions; thwarting attacks; Buffer overflows; Context; Internet of things; Security; Servers; TV; Buffer Overflow; Code Security; Internet of Things;
fLanguage :
English
Journal_Title :
Latin America Transactions, IEEE (Revista IEEE America Latina)
Publisher :
ieee
ISSN :
1548-0992
Type :
jour
DOI :
10.1109/TLA.2015.7106364
Filename :
7106364
Link To Document :
بازگشت