skip to main content
Visitante
Meu Espaço
Minha Conta
Sair
Identificação
This feature requires javascript
Tags
Revistas Eletrônicas (eJournals)
Livros Eletrônicos (eBooks)
Bases de Dados
Bibliotecas USP
Ajuda
Ajuda
Idioma:
Inglês
Espanhol
Português
This feature required javascript
This feature requires javascript
Primo Search
Busca Geral
Busca Geral
Acervo Físico
Acervo Físico
Produção Intelectual da USP
Produção USP
Search For:
Clear Search Box
Search in:
Busca Geral
Or select another collection:
Search in:
Busca Geral
Busca Avançada
Busca por Índices
This feature requires javascript
This feature requires javascript
Effective Security Schemes for Smart Home Internet of Things
0000-0001-6555-9858 ; Fu, Chenglong
Temple University. Libraries
Sem texto completo
Citações
Citado por
Serviços
Detalhes
Resenhas & Tags
Nº de Citações
This feature requires javascript
Enviar para
Adicionar ao Meu Espaço
Remover do Meu Espaço
E-mail (máximo 30 registros por vez)
Imprimir
Link permanente
Referência
EasyBib
EndNote
RefWorks
del.icio.us
Exportar RIS
Exportar BibTeX
This feature requires javascript
Título:
Effective Security Schemes for Smart Home Internet of Things
Autor:
0000-0001-6555-9858
;
Fu, Chenglong
Descrição:
Recent advancements in low-cost and low-power hardware facilitate the prevalence of Internet of Things (IoT) to be adopted in various smart environments. Although our works mainly take the smart home as the target application scenario, they can be easily applied to other smart environments such as smart office and industry. These devices and systems bring higher-level context sensing capability and enable intelligent and autonomous actions. However, these advantages are greatly undermined by concerns over the systems’ security issues. Due to constraints on cost, power, and size, a large number of high-risk vulnerabilities of IoT/CPS (Cyber Physical System) systems are being discovered every year, which allow attackers to exploit them and expand their attacks from cyberspace to the physical world and causes severe damages. To cope with these emerging threats, we systematically investigate constituent components of IoT systems. Based on our exploration, we reveal new vulnerabilities and propose effective defense and detection mechanisms. ; In one work, we propose a novel semantic-aware anomaly detection scheme for smart home IoT systems, which provides timely anomaly alerts with a very low false alarm rate. In this scheme, we innovatively present the inter-device correlations as a uniform representation for profiling normal behaviors of smart home IoT systems. We utilize semantic information such as automation rules and device attributes to generate hypothetical correlations and then test them using collected event logs. The accepted correlations are then applied to the real-time events stream which can raise alarms when there is violation. We build a prototype anomaly detection system and evaluate it on four real-world testbeds. The evaluation results show that the accuracies are higher than 97%. ; In another work, we design an audio adversarial examples (AEs) detection system that can protect any system that uses audio speech recognition (ASR), such as smart speakers. We observe that existing audio AEs cannot transfer among different speech recognition model. Based on this observation, we propose to apply multiple speech recognition models to an input audio samples concurrently and detect AEs as those have inconsistent transcripts. We evaluate the our prototype detector on 1,125 benign audio samples and 1,125 AE samples. The results show an detection accuracy of over 98%. ; We conduct detailed investigation of IoT messaging protocols. We discover a new vulnerability of the IoT message timeout handling mechanism that broadly affects a large number of IoT devices and is not due to implementation flaws. We summarize our discovery as two attack primitives that can stealthily delay event and command messages, respectively. Further, we build three types of attacks based on them, which can manipulate the execution of automation rules to trigger erroneous actions or disable actions of safety-critical devices. We extensively evaluate the vulnerability on 50 IoT devices (belonging to 8 types) construct 11 proof-of-concept attacking cases that are collected from real-world user forums. The results show the effectiveness of the attack. We have reported the discovered vulnerability to major IoT vendors, including Apple, Google, Amazon, Ring, SmartThings, and SimpliSafe, and some vendors have discussed their counter measurements. ; We also develop a blockchain-assisted distributed relay sharing scheme for smart home IoT systems. The scheme can effectively resolve the single points of failure (SPOF) problem of existing cloud based service architecture and prevent malicious behaviors through financial punishment. Computer and Information Science
Editor:
Temple University. Libraries
Idioma:
Inglês
Links
View record in Networked Digital Library of Theses and Dissertations (NDLTD)$$FView record in $$GNetworked Digital Library of Theses and Dissertations (NDLTD)
This feature requires javascript
This feature requires javascript
Voltar para lista de resultados
This feature requires javascript
This feature requires javascript
Buscando em bases de dados remotas. Favor aguardar.
Buscando por
em
scope:(USP_PRODUCAO),scope:(USP_EBOOKS),scope:("PRIMO"),scope:(USP),scope:(USP_EREVISTAS),scope:(USP_FISICO),primo_central_multiple_fe
Mostrar o que foi encontrado até o momento
This feature requires javascript
This feature requires javascript