Insecurity by Design: Today’s IoT Device Security Problem

Maire O’Neill

Engineering ›› 2016, Vol. 2 ›› Issue (1) : 48-49.

PDF(576 KB)
PDF(576 KB)
Engineering ›› 2016, Vol. 2 ›› Issue (1) : 48-49. DOI: 10.1016/J.ENG.2016.01.014
Views & Comments
Views & Comments

Insecurity by Design: Today’s IoT Device Security Problem

Author information +
History +

Cite this article

Download citation ▾
Maire O’Neill. Insecurity by Design: Today’s IoT Device Security Problem. Engineering, 2016, 2(1): 48‒49 https://doi.org/10.1016/J.ENG.2016.01.014

References

[1]
Rivera J, Van der Meulen R. Gartner says 4.9 billion connected “things” will be in use in 2015 [Internet]. 2014Nov11 [cited 2016Feb20]. Available from: http://www.gartner.com/newsroom/id/2905717.
[2]
Cisco. Internet of things (IoT) [Internet]. [cited 2015Jul23]. Available from: http://www.cisco.com/web/solutions/trends/iot/portfolio.html.
[3]
Chapman A. Hacking into internet connected light bulbs [Internet]. 2014Jul4[cited 2015Sep15]. Available from: http://contextis.com/resources/blog/hacking-internet-connected-light-bulbs.
[4]
Greenberg A. Hackers remotely kill a jeep on the highway−with me in it [Internet]. Wired2015Jul21 [cited 2015Sep15]. Available from: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.
[5]
Oswald D, Paar C. Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world. In: Preneel B, Takagi T, editors Cryptographic Hardware and Embedded Dystems−CHES 2011: 13th International Workshop; 2011Sep28−Oct1; Nara, Japan. Berlin: Springer; 2011. p. 207−22.
[6]
Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner D, editor Advances in Cryptology−CRYPTO 2008: 28th Annual International Cryptology Conference; 2008Aug17−21; Santa Barbara, CA, USA. Berlin: Springer; 2008. p. 203−20.
[7]
Moradi A, Kasper M, Paar C. Black-box side-channel attacks highlight the importance of countermeasures−an analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism. In: Dunkelman O, editor Topics in Cryptology−CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012; 2012Feb27−Mar2; San Francisco, CA, USA. Berlin: Springer; 2012. p. 1−18.
[8]
National Security Agency. Suite B Cryptography today [Internet]. 2015Aug19 [cited 2015Sep15]. Available from: https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml.
[9]
SAFEcrypto. About SAFEcrypto [Internet]. [cited 2015Sep15]. Available from: www.safecrypto.eu.
[10]
Gu C, O’Neill M. Ultra-compact and robust FPGA-based PUF identification generator. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS’15); 2015May24−27; Lisbon, Portugal; 2015. p. 934−7.
Funding
 
AI Summary AI Mindmap
PDF(576 KB)

Accesses

Citations

Detail

Sections
Recommended

/