Defendendo Internet das Coisas contra Exploits
(Defending Internet of Things against Exploits)
Fernando Augusto Teixeira (firstname.lastname@example.org)1, Gustavo Menezes Vieira (email@example.com)1, Pablo Marcondes Fonseca (firstname.lastname@example.org)1, Fernando Magno Quintão Pereira (email@example.com)1, Hao Chi Wong (firstname.lastname@example.org)2, José Marcos Silva Nogueira (email@example.com)1, Leonardo Barbosa Oliveira (firstname.lastname@example.org)1
This paper appears in: Revista IEEE América Latina
Publication Date: April 2015
Volume: 13, Issue: 4
The Internet of Things (IoT) demands tailor-made security solutions. Today, there are a number of proposals able to meet IoT's demands in the context of attacks from outsiders. In the context of insiders, however, this does not hold true. Existing solutions to deal with this class of attacks not always take into consideration the IoT's idiosyncrasies and, therefore, they do not produce the best results. This work aims at coming up with tailor-made security schemes for thwarting attacks from insiders in the context of IoT systems. Our solution makes use of a pioneering solution to pinpoint vulnerabilities: we crosscheck data from communicating nodes. It provides the same guarantees as traditional security mechanisms, but it is about 83% more efficient, according to the experiments that this article describes.
Code Security, Internet of Things, Buffer Overflow
Documents that cite this
This function is not implemented yet.
[PDF Full-Text (499)]