Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT)

被引:86
作者
Patton, Mark [1 ]
Gross, Eric [1 ]
Chinn, Ryan [1 ]
Forbis, Samantha [1 ]
Walker, Leon [1 ]
Chen, Hsinchun [1 ]
机构
[1] Univ Arizona, Tucson, AZ 85721 USA
来源
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC) | 2014年
基金
美国国家科学基金会;
关键词
D O I
10.1109/JISIC.2014.43
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things ( IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these devices, and their remote connectivity, has brought a new level of efficiency into our lives. However, the security of these devices has come into question. While many may be secure, the sheer number creates an environment where even a small percentage of insecure devices may create significant vulnerabilities. This paper evaluates some of the emerging vulnerabilities that exist and puts some figures to the scale of the threat.
引用
收藏
页码:232 / 235
页数:4
相关论文
共 12 条
[1]  
Brodsky J., 2013, SHINE A SURVEY INTER
[2]  
Cui M. C. a. S. J. S. A., 2013, 20 ANN NETW DISTR SY
[3]  
Durumeric J. H. a. E. W. Z., 2013, ZMAP RES PAPER
[4]  
Evans D., 2011, CISCO
[5]  
Fox B., ATTACK TOOLS BISHOP
[6]  
Goodin D., 2013, WERE GOING BLOW YOUR
[7]  
Matherly J., 2014, COMMUNICATION
[8]  
Moore H., PROJECT SONAR WELCOM
[9]  
Ouchn N., 2014, DPETHE DEFAULT PASSW
[10]  
OWASP, 2013, TEST WEB APPL FING O