메뉴 건너뛰기




Volumn 6, Issue 2, 2019, Pages 1606-1616

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

Author keywords

Internet of Things (IoT); IoT features; privacy; security; survey

Indexed keywords

AUTOMATION; COMPUTER PRIVACY; DATA PRIVACY; DOMESTIC APPLIANCES; FEATURE EXTRACTION; INTELLIGENT BUILDINGS; NETWORK PROTOCOLS; SECURITY OF DATA; SURVEYING; SURVEYS;

EID: 85048613168     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2018.2847733     Document Type: Article
Times cited : (337)

References (74)
  • 2
    • 85065679631 scopus 로고    scopus 로고
    • Int. Data Corporat., Framingham, MA, USA
    • Internet of Things Market Statistics, Int. Data Corporat., Framingham, MA, USA, 2016. [Online]. Available: http://www.ironpaper.com/ webintel/articles/internet-of-things-market-statistics/
    • (2016) Internet of Things Market Statistics
  • 3
    • 85061427382 scopus 로고    scopus 로고
    • Bigthink Edge
    • Bigthink Edge. (2016). Hacking the Human Heart. [Online]. Available: http://bigthink.com/future-crimes/hacking-The-human-heart
    • (2016) Hacking the Human Heart
  • 4
    • 85061448243 scopus 로고    scopus 로고
    • Envista Forensics
    • Envista Forensics. (2015). The Most Hackable Cars on the Road. [Online]. Available: http://www.envistaforensics.com/news/themost-hackable-cars-on-The-road-1
    • (2015) The Most Hackable Cars on the Road
  • 5
    • 85045689875 scopus 로고    scopus 로고
    • Wikipedia. 2016 Dyn Cyberattack. [Online]. Available: https:// en.wikipedia.org/w/index.php?title=2016Dyncyberattack&oldid=763 071700
    • (2016) Dyn Cyberattack
  • 6
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • May/Jun
    • R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May/Jun. 2011.
    • (2011) IEEE Security Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 9
    • 84961579337 scopus 로고    scopus 로고
    • The Internet of Things: A security point of view
    • S. Li, T. Tryfonas, and H. Li, "The Internet of Things: A security point of view," Internet Res., vol. 26, no. 2, pp. 337-359, 2016.
    • (2016) Internet Res , vol.26 , Issue.2 , pp. 337-359
    • Li, S.1    Tryfonas, T.2    Li, H.3
  • 10
    • 85026378512 scopus 로고    scopus 로고
    • A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications
    • Oct
    • J. Lin et al., "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1125-1142
    • Lin, J.1
  • 11
    • 85065680560 scopus 로고    scopus 로고
    • Afety, security, and privacy threats posed by accelerating trends in the Internet of Things
    • Washington, DC, USA, Rep
    • K. Fu et al., "Afety, security, and privacy threats posed by accelerating trends in the Internet of Things," Comput. Community Consortium, Washington, DC, USA, Rep., 2017. [Online]. Available: http://cra.org/ ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT.pdf
    • (2017) Comput. Community Consortium
    • Fu, K.1
  • 12
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of Things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of Things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Comput. Netw , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 14
    • 85030314760 scopus 로고    scopus 로고
    • A survey on security and privacy issues in Internet-of-Things
    • Oct
    • Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, "A survey on security and privacy issues in Internet-of-Things," IEEE Internet Things J., vol. 4, no. 5, pp. 1250-1258, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1250-1258
    • Yang, Y.1    Wu, L.2    Yin, G.3    Li, L.4    Zhao, H.5
  • 15
    • 84922933943 scopus 로고    scopus 로고
    • Low-energy security: Limits and opportunities in the Internet of Things
    • Jan./Feb
    • W. Trappe, R. Howard, and R. S. Moore, "Low-energy security: Limits and opportunities in the Internet of Things," IEEE Security Privacy, vol. 13, no. 1, pp. 14-21, Jan./Feb. 2015.
    • (2015) IEEE Security Privacy , vol.13 , Issue.1 , pp. 14-21
    • Trappe, W.1    Howard, R.2    Moore, R.S.3
  • 16
    • 85065677995 scopus 로고    scopus 로고
    • L. Tibbets and J. Tane. (2012). IFTTT. [Online]. Available: https://platform.ifttt.com/
    • (2012) IFTTT
    • Tibbets, L.1    Tane, J.2
  • 17
    • 84945190529 scopus 로고    scopus 로고
    • Samsung
    • Samsung. (2014). SmartThings. [Online]. Available: https://www.smartthings.com/
    • (2014) SmartThings
  • 18
    • 85065681241 scopus 로고    scopus 로고
    • Apple
    • Apple. (2014). HomeKit. [Online]. Available: https://developer.apple.com/homekit/
    • (2014) HomeKit
  • 19
    • 85065679636 scopus 로고    scopus 로고
    • Amazon
    • Amazon. (2012). Alexa. [Online]. Available: https://developer.amazon.com/alexa
    • (2012) Alexa
  • 20
    • 84987660714 scopus 로고    scopus 로고
    • Security analysis of emerging smart home applications
    • San Jose, CA, USA
    • E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," in Proc. IEEE Security Privacy, San Jose, CA, USA, 2016, pp. 636-654.
    • (2016) Proc. IEEE Security Privacy , pp. 636-654
    • Fernandes, E.1    Jung, J.2    Prakash, A.3
  • 21
    • 84962691282 scopus 로고    scopus 로고
    • Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
    • T. Yu et al., "Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things," in Proc. ACM Workshop Hot Topics Netw., 2015, p. 5.
    • (2015) Proc. ACM Workshop Hot Topics Netw , pp. 5
    • Yu, T.1
  • 22
    • 85159782356 scopus 로고    scopus 로고
    • ContexIoT: Towards providing contextual integrity to appified IoT platforms
    • Y. J. Jia et al., "ContexIoT: Towards providing contextual integrity to appified IoT platforms," in Proc. Netw. Distrib. Syst. Security Symp., 2017, pp. 1-15.
    • (2017) Proc. Netw. Distrib. Syst. Security Symp , pp. 1-15
    • Jia, Y.J.1
  • 23
    • 85065681722 scopus 로고    scopus 로고
    • JD Alpha
    • JD Alpha. (2015). Joylink. [Online]. Available: http:// smartdev.jd.com/
    • (2015) , pp. Joylink
  • 24
    • 85065681962 scopus 로고    scopus 로고
    • Alibaba
    • Alibaba. (2015). Alink. [Online]. Available: https:// open.aliplus.com/docs/open/
    • (2015) Alink
  • 25
    • 84946397217 scopus 로고    scopus 로고
    • Alibaba
    • Alibaba. (2015). Internet of Things Security Report. [Online]. Available: https://jaq.alibaba.com/community/art/show?articleid=195
    • (2015) Internet of Things Security Report
  • 26
    • 85037062546 scopus 로고    scopus 로고
    • Network Working Group Internet-Draft
    • Network Working Group Internet-Draft. (2017). Secure IoT Bootstrapping: A Survey. [Online]. Available: https://tools.ietf.org/ html/draft-sarikaya-t2trg-sbootstrapping-03
    • (2017) Secure IoT Bootstrapping: A Survey
  • 27
    • 85037080392 scopus 로고    scopus 로고
    • Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices
    • Dallas, TX, USA
    • H. Liu et al., "Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices," in Proc. IoT Security Privacy Workshop, Dallas, TX, USA, 2017, pp. 13-18.
    • (2017) Proc. IoT Security Privacy Workshop , pp. 13-18
    • Liu, H.1
  • 30
    • 85075533110 scopus 로고    scopus 로고
    • FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution
    • D. Davidson, B. Moench, S. Jha, and T. Ristenpart, "FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution," in Proc. USENIX Security Symp., 2013, pp. 463-478.
    • (2013) Proc. USENIX Security Symp , pp. 463-478
    • Davidson, D.1    Moench, B.2    Jha, S.3    Ristenpart, T.4
  • 34
    • 85037543508 scopus 로고    scopus 로고
    • Network analysis of reconnaissance and intrusion of an industrial control system
    • U.S. Army Res. Lab., Adelphi, MD, USA, Rep. ARL-TR-7775
    • D. T. Sullivan and E. J. Colbert, "Network analysis of reconnaissance and intrusion of an industrial control system," Comput. Inf. Sci. Directorate, U.S. Army Res. Lab., Adelphi, MD, USA, Rep. ARL-TR-7775, 2016.
    • (2016) Comput. Inf. Sci. Directorate
    • Sullivan, D.T.1    Colbert, E.J.2
  • 36
    • 84900427392 scopus 로고    scopus 로고
    • TrustLite: A security architecture for tiny embedded devices
    • Amsterdam, The Netherlands
    • P. Schulz, S. Koeberl, A.-R. Sadeghi, and V. Varadharajan, "TrustLite: A security architecture for tiny embedded devices," in Proc. ACM EuroSys, Amsterdam, The Netherlands, 2014, pp. 1-14.
    • (2014) Proc. ACM EuroSys , pp. 1-14
    • Schulz, P.1    Koeberl, S.2    Sadeghi, A.-R.3    Varadharajan, V.4
  • 37
    • 85024501556 scopus 로고    scopus 로고
    • Protecting bare-metal embedded systems with privilege overlays
    • San Jose, CA, USA
    • A. A. Clements et al., "Protecting bare-metal embedded systems with privilege overlays," in Proc. IEEE Security Privacy, San Jose, CA, USA, 2017, pp. 289-303.
    • (2017) Proc. IEEE Security Privacy , pp. 289-303
    • Clements, A.A.1
  • 38
    • 85126212428 scopus 로고    scopus 로고
    • Securing real-time microcontroller systems through customized memory view switching
    • C. H. Kim et al., "Securing real-time microcontroller systems through customized memory view switching," in Proc. Netw. Distrib. Syst. Security Symp., 2018.
    • (2018) Proc. Netw. Distrib. Syst. Security Symp
    • Kim, C.H.1
  • 40
    • 85020028228 scopus 로고    scopus 로고
    • An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices
    • Y. Shi, W. Wei, Z. He, and H. Fan, "An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices," in Proc. ACM Conf. Comput. Security Appl., 2016, pp. 16-29.
    • (2016) Proc. ACM Conf. Comput. Security Appl , pp. 16-29
    • Shi, Y.1    Wei, W.2    He, Z.3    Fan, H.4
  • 43
    • 84864182393 scopus 로고    scopus 로고
    • Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
    • San Francisco, CA, USA
    • M. Majzoobi, M. Rostami, F. Koushanfar, D. S.Wallach, and S. Devadas, "Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching," in Proc. IEEE Security Privacy Workshops, San Francisco, CA, USA, 2012. pp. 33-44.
    • (2012) Proc. IEEE Security Privacy Workshops , pp. 33-44
    • Majzoobi, M.1    Rostami, M.2    Koushanfar, F.3    Wallach, D.S.4    Devadas, S.5
  • 45
    • 85086456788 scopus 로고    scopus 로고
    • KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvesting
    • W. Xu et al., "KEH-Gait: Towards a mobile healthcare user authentication system by kinetic energy harvesting," in Proc. Netw. Distrib. Syst. Security Symp., 2017.
    • (2017) Proc. Netw. Distrib. Syst. Security Symp
    • Xu, W.1
  • 46
    • 84958638830 scopus 로고    scopus 로고
    • Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication
    • R. A. Scheel and A. Tyagi, "Characterizing composite user-device touchscreen physical unclonable functions (PUFs) for mobile device authentication," in Proc. Int. Workshop Trustworthy Embedded Devices, 2015, pp. 3-13.
    • (2015) Proc. Int. Workshop Trustworthy Embedded Devices , pp. 3-13
    • Scheel, R.A.1    Tyagi, A.2
  • 47
    • 85065682168 scopus 로고    scopus 로고
    • Checkpoint Research
    • Checkpoint Research. (2017). IoTroop Botnet: The Full Investigation. [Online]. Available: https://research.checkpoint.com/iotroop-botnet-fullinvestigation/
    • (2017) IoTroop Botnet: The Full Investigation
  • 48
    • 85084163626 scopus 로고    scopus 로고
    • IoTPOT: Analysing the rise of IoT compromises
    • Y. M. P. Pa et al., "IoTPOT: Analysing the rise of IoT compromises," in Proc. USENIX Conf. Offensive Technol., 2015, p. 9.
    • (2015) Proc. USENIX Conf. Offensive Technol , pp. 9
    • Pa, Y.M.P.1
  • 49
    • 85024497200 scopus 로고    scopus 로고
    • DDoS in the IoT: Mirai and other botnets
    • Jul
    • C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer, vol. 50, no. 7, pp. 80-84, Jul. 2017.
    • (2017) Computer , vol.50 , Issue.7 , pp. 80-84
    • Kolias, C.1    Kambourakis, G.2    Stavrou, A.3    Voas, J.4
  • 50
    • 84937792152 scopus 로고    scopus 로고
    • Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network
    • C. Zhang and R. Green, "Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network," in Proc. Symp. Commun. Netw. Soc. Comput. Simulat. Int., 2015, pp. 8-15.
    • (2015) Proc. Symp. Commun. Netw. Soc. Comput. Simulat. Int , pp. 8-15
    • Zhang, C.1    Green, R.2
  • 51
    • 84921341664 scopus 로고    scopus 로고
    • Camouflage traffic: Minimizing message delay for smart grid applications under jamming
    • Jan./Feb
    • Z. Lu, W. Wang, and C. Wang, "Camouflage traffic: Minimizing message delay for smart grid applications under jamming," IEEE Trans. Dependable Secure Comput., vol. 12 no. 1, pp. 31-44, Jan./Feb. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput , vol.12 , Issue.1 , pp. 31-44
    • Lu, Z.1    Wang, W.2    Wang, C.3
  • 54
    • 85076321179 scopus 로고    scopus 로고
    • Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
    • J. Noorman et al., "Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base," in Proc. 22nd USENIX Conf. Security, 2013, pp. 479-494.
    • (2013) Proc. 22nd USENIX Conf. Security , pp. 479-494
    • Noorman, J.1
  • 56
    • 85008684152 scopus 로고    scopus 로고
    • Is anybody home? Inferring activity from smart home network traffic
    • San Jose, CA, USA
    • B. Copos, K. Levitt, M. Bishop, and J. Rowe, "Is anybody home? Inferring activity from smart home network traffic," in Proc. IEEE Security Privacy Workshops, San Jose, CA, USA, 2016, pp. 245-251.
    • (2016) Proc. IEEE Security Privacy Workshops , pp. 245-251
    • Copos, B.1    Levitt, K.2    Bishop, M.3    Rowe, J.4
  • 59
    • 85065682544 scopus 로고    scopus 로고
    • MarketsandMarkets. Dec
    • MarketsandMarkets. (Dec. 2015). Insurance Telematics Market Worth 2.21 Billion USD by 2020. [Online]. Available: http://www.prnewswire.com/news-releases/insurance-telematics-marketworth-221-billion-usd-by-2020-561817961.html
    • (2015) Insurance Telematics Market Worth 2.21 Billion USD by 2020
  • 60
    • 84869385926 scopus 로고    scopus 로고
    • Minimizing private data disclosures in the smart grid
    • W. Yang et al., "Minimizing private data disclosures in the smart grid," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 415-427.
    • (2012) Proc. ACM Conf. Comput. Commun. Security , pp. 415-427
    • Yang, W.1
  • 62
    • 85019042766 scopus 로고    scopus 로고
    • A secure mechanism for big data collection in large scale Internet of Vehicle
    • Apr
    • L. Guo et al., "A secure mechanism for big data collection in large scale Internet of Vehicle," IEEE Internet Things J., vol. 4, no. 4, pp. 601-610, Apr. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.4 , pp. 601-610
    • Guo, L.1
  • 64
    • 85007524464 scopus 로고    scopus 로고
    • A multi-cloud based privacypreserving data publishing scheme for the Internet of Things
    • L. Yang, A. Humayed, and F. Li, "A multi-cloud based privacypreserving data publishing scheme for the Internet of Things," in Proc. ACM Conf. Comput. Security Appl., 2016, pp. 30-39.
    • (2016) Proc. ACM Conf. Comput. Security Appl , pp. 30-39
    • Yang, L.1    Humayed, A.2    Li, F.3
  • 66
    • 85027017308 scopus 로고    scopus 로고
    • Trust-based service management for social Internet of Things systems
    • Nov./Dec
    • I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for social Internet of Things systems," IEEE Trans. Dependable Secure Comput., vol. 13, no. 6, pp. 684-696, Nov./Dec. 2016.
    • (2016) IEEE Trans. Dependable Secure Comput , vol.13 , Issue.6 , pp. 684-696
    • Chen, I.-R.1    Bao, F.2    Guo, J.3
  • 68
    • 85048671552 scopus 로고    scopus 로고
    • WeLiveSecurity Oct
    • WeLiveSecurity. (Oct. 2016). 10 Things to Know About the October 21 IoT DDoS Attacks. [Online]. Available: https://www.welivesecurity.com/2016/10/24/10-things-know-october-21-iot-ddos-attacks/
    • (2016) 10 Things to Know about the October 21 IoT DDoS Attacks
  • 69
    • 84964764354 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • Las Vegas, NV, USA
    • C. Miller and C. Valasek, "Remote exploitation of an unaltered passenger vehicle," in Proc. Black Hat USA, Las Vegas, NV, USA, 2015.
    • (2015) Proc. Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 70
    • 85008689692 scopus 로고    scopus 로고
    • Mapping the internet of things
    • A. Wright, "Mapping the Internet of Things," Commun. ACM, vol. 60, no. 1, pp. 16-18, 2016.
    • (2016) Commun. ACM , vol.60 , Issue.1 , pp. 16-18
    • Wright, A.1
  • 71
    • 84900826011 scopus 로고    scopus 로고
    • Internet of Things for enterprise systems of modern manufacturing
    • May
    • Z. Bi, L. D. Xu, and C. Wang, "Internet of Things for enterprise systems of modern manufacturing," IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1537-1546, May 2014.
    • (2014) IEEE Trans. Ind. Informat , vol.10 , Issue.2 , pp. 1537-1546
    • Bi, Z.1    Xu, L.D.2    Wang, C.3
  • 72
    • 84947063778 scopus 로고    scopus 로고
    • OWASP. (2014). OWASP Internet of Things Top Ten. [Online]. Available: https://www.owasp.org/images/7/71/InternetofThingsTopTen2014-OWASP.pdf
    • (2014) OWASP Internet of Things Top Ten
  • 73
    • 85007039883 scopus 로고    scopus 로고
    • From physical to cyber: Escalating protection for personalized auto insurance
    • L. Guan et al., "From physical to cyber: Escalating protection for personalized auto insurance," in Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), 2016, pp. 42-55.
    • (2016) Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. (SenSys) , pp. 42-55
    • Guan, L.1
  • 74
    • 85026209717 scopus 로고    scopus 로고
    • TrustShadow: Secure execution of unmodified applications with ARM TrustZone
    • L. Guan et al., "TrustShadow: Secure execution of unmodified applications with ARM TrustZone," in Proc. 15th Annu. Int. Conf. Mobile Syst. Appl. Services, 2017, pp. 488-501.
    • (2017) Proc. 15th Annu. Int. Conf. Mobile Syst. Appl. Services , pp. 488-501
    • Guan, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.