Securing a Connected Home

被引:0
作者
Camphouse, Andrew [1 ]
Ngalamou, Lucien [1 ]
机构
[1] Lewis Univ, Comp & Math Sci Dept, Romeoville, IL 60446 USA
来源
2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2019年
关键词
Information Security; Internet of Things; Intrusion Detection; Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern home is becoming more and more reliant on connected devices. Nearly every device from the refrigerator to the thermostat is capable of connecting to the internet and communicating with other devices. Information security is discussed as it relates to smart home and Internet of Things devices. Several examples of exploits discovered in popular smart home hardware are discussed. A network security and monitoring appliance for the home is proposed as a possible solution.
引用
收藏
页码:250 / 256
页数:7
相关论文
共 50 条
  • [31] Securing the Smart Grid
    Hastings, John
    Laverty, David M.
    Morrow, D. John
    2014 49TH INTERNATIONAL UNIVERSITIES POWER ENGINEERING CONFERENCE (UPEC), 2014,
  • [32] Securing Webpages with the EasyIPBlocker
    Reed, Maurice
    Wang, Zizhong John
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1351 - 1354
  • [33] Effectiveness of content spatial distribution analysis in securing IoT environments
    Angiulli, Fabrizio
    Argento, Luciano
    Furfaro, Angelo
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018), 2018, : 41 - 46
  • [34] Securing the weak spots
    Baldin A.
    2018, Elsevier Ltd (2018) : 6 - 8
  • [35] Securing the biometric model
    Leniski, AC
    Skinner, RC
    McGann, SF
    Elliott, SJ
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 444 - 449
  • [36] A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends
    Neto, Helio N. Cunha
    Hribar, Jernej
    Dusparic, Ivana
    Mattos, Diogo Menezes Ferrazani
    Fernandes, Natalia C. C.
    IEEE ACCESS, 2023, 11 : 41928 - 41953
  • [37] Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
    Rahman, Ziaur
    Yi, Xun
    Billah, Mustain
    Sumi, Mousumi
    Anwar, Adnan
    ELECTRONICS, 2022, 11 (07)
  • [38] Securing Over-The-Air IoT Firmware Updates using Blockchain
    He, Xinchi
    Alqahtani, Sarra
    Gamble, Rose
    Papa, Mauricio
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 164 - 171
  • [39] Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
    Ismail, Shereen
    Dawoud, Diana W. W.
    Reza, Hassan
    FUTURE INTERNET, 2023, 15 (06):
  • [40] A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
    Yilmaz, Selim
    Aydogan, Emre
    Sen, Sevil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4405 - 4418