Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Engineering >> 2016, Volume 2, Issue 1 doi: 10.1016/J.ENG.2016.01.014

Insecurity by Design: Today’s IoT Device Security Problem

Research Director, Secure Digital Systems at the Center for Secure Information Technologies (CSIT), Queen’s University Belfast

Available online: 2016-03-30

Next Previous

Figures

Fig. 1

Fig. 2

References

[ 1 ] Rivera J, Van der Meulen R. Gartner says 4.9 billion connected “things” will be in use in 2015 [Internet]. 2014Nov11 [cited 2016Feb20]. Available from: http://www.gartner.com/newsroom/id/2905717.

[ 2 ] Cisco. Internet of things (IoT) [Internet]. [cited 2015Jul23]. Available from: http://www.cisco.com/web/solutions/trends/iot/portfolio.html.

[ 3 ] Chapman A. Hacking into internet connected light bulbs [Internet]. 2014Jul4[cited 2015Sep15]. Available from: http://contextis.com/resources/blog/hacking-internet-connected-light-bulbs.

[ 4 ] Greenberg A. Hackers remotely kill a jeep on the highway−with me in it [Internet]. Wired2015Jul21 [cited 2015Sep15]. Available from: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.

[ 5 ] Oswald D, Paar C. Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world. In: Preneel B, Takagi T, editors Cryptographic Hardware and Embedded Dystems−CHES 2011: 13th International Workshop; 2011Sep28−Oct1; Nara, Japan. Berlin: Springer; 2011. p. 207−22.

[ 6 ] Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner D, editor Advances in Cryptology−CRYPTO 2008: 28th Annual International Cryptology Conference; 2008Aug17−21; Santa Barbara, CA, USA. Berlin: Springer; 2008. p. 203−20.

[ 7 ] Moradi A, Kasper M, Paar C. Black-box side-channel attacks highlight the importance of countermeasures−an analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism. In: Dunkelman O, editor Topics in Cryptology−CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012; 2012Feb27−Mar2; San Francisco, CA, USA. Berlin: Springer; 2012. p. 1−18.

[ 8 ] National Security Agency. Suite B Cryptography today [Internet]. 2015Aug19 [cited 2015Sep15]. Available from: https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml.

[ 9 ] SAFEcrypto. About SAFEcrypto [Internet]. [cited 2015Sep15]. Available from: www.safecrypto.eu.

[10] Gu C, O’Neill M. Ultra-compact and robust FPGA-based PUF identification generator. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’15); 2015May24−27; Lisbon, Portugal; 2015. p. 934−7.

Related Research