publication . Preprint . 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk;
Open Access English
  • Published: 06 Feb 2018
Abstract
The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of the IoT devices. One interesting emerging threat vector is the attacks that abuse the use of sensors on IoT devices. IoT devices are vulnerable to sensor-based threats due ...
Subjects
free text keywords: Computer Science - Cryptography and Security
Download from
103 references, page 1 of 7

[1] N. Bari, G. Mani, and S. Berkovich, “Internet of things as a methodological concept,” in Fourth International Conference on Computing for Geospatial Research and Application (COM. Geo), 2013. IEEE, pp. 48-55.

[2] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” IEEE Communications magazine, vol. 48, no. 9, 2010.

[3] Y. Yu, J. Wang, and G. Zhou, “The exploration in the education of professionals in applied internet of things engineering,” in 4th International Conference on Distance Learning and Education (ICDLE), 2010. IEEE, pp. 74-77.

[4] J. Greenough, “How the 'internet of things' will impact consumers, businesses, and governments in 2016 and beyond,” April 2015. [Online]. Available: http://www.businessinsider.com/ how-the-internet-of-things-market-will-grow-2014-10

[5] A. K. Sikder, H. Aksu, and A. S. Uluagac, “6thsense: A contextaware sensor-based attack detector for smart devices,” in 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 397- 414. [OpenAIRE]

[6] Y. Son, H. Shin, D. Kim, Y.-S. Park, J. Noh, K. Choi, J. Choi, Y. Kim et al., “Rocking drones with intentional sound noise on gyroscopic sensors.” in USENIX Security, 2015, pp. 881-896.

[7] A. Nahapetian, “Side-channel attacks on mobile and wearable systems,” in Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual. IEEE, 2016, pp. 243-247. [OpenAIRE]

[8] V. Subramanian, S. Uluagac, H. Cam, and R. Beyah, “Examining the characteristics and implications of sensor side channels,” in 2013 IEEE International Conference on Communications (ICC),, pp. 2205-2210. [OpenAIRE]

[9] R. Hasan, N. Saxena, T. Haleviz, S. Zawoad, and D. Rinehart, “Sensing-enabled channels for hard-to-detect command and control of mobile devices,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 469- 480.

[10] R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang, “Soundcomber: A stealthy and context-aware sound trojan for smartphones.” NDSS, vol. 11, pp. 17-33, 2011.

[11] L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 1, p. 3, 2009.

[12] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(smart) watch your taps: side-channel keystroke inference attacks using smartwatches,” in Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, pp. 27-30. [OpenAIRE]

[13] S. M. Del Pozo, F.-X. Standaert, D. Kamel, and A. Moradi, “Sidechannel attacks from static power: When should we care?” in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp. 145-150.

[14] A. S. Uluagac, V. Subramanian, and R. Beyah, “Sensory channel threats to cyber physical systems: A wake-up call,” in 2014 IEEE Conference on Communications and Network Security (CNS), pp. 301-309. [OpenAIRE]

[15] G. Petracca, A.-A. Reineh, Y. Sun, J. Grossklags, and T. Jaeger, “Aware: Preventing abuse of privacy-sensitive sensors via operation bindings,” 2017.

103 references, page 1 of 7
Abstract
The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of the IoT devices. One interesting emerging threat vector is the attacks that abuse the use of sensors on IoT devices. IoT devices are vulnerable to sensor-based threats due ...
Subjects
free text keywords: Computer Science - Cryptography and Security
Download from
103 references, page 1 of 7

[1] N. Bari, G. Mani, and S. Berkovich, “Internet of things as a methodological concept,” in Fourth International Conference on Computing for Geospatial Research and Application (COM. Geo), 2013. IEEE, pp. 48-55.

[2] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” IEEE Communications magazine, vol. 48, no. 9, 2010.

[3] Y. Yu, J. Wang, and G. Zhou, “The exploration in the education of professionals in applied internet of things engineering,” in 4th International Conference on Distance Learning and Education (ICDLE), 2010. IEEE, pp. 74-77.

[4] J. Greenough, “How the 'internet of things' will impact consumers, businesses, and governments in 2016 and beyond,” April 2015. [Online]. Available: http://www.businessinsider.com/ how-the-internet-of-things-market-will-grow-2014-10

[5] A. K. Sikder, H. Aksu, and A. S. Uluagac, “6thsense: A contextaware sensor-based attack detector for smart devices,” in 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 397- 414. [OpenAIRE]

[6] Y. Son, H. Shin, D. Kim, Y.-S. Park, J. Noh, K. Choi, J. Choi, Y. Kim et al., “Rocking drones with intentional sound noise on gyroscopic sensors.” in USENIX Security, 2015, pp. 881-896.

[7] A. Nahapetian, “Side-channel attacks on mobile and wearable systems,” in Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual. IEEE, 2016, pp. 243-247. [OpenAIRE]

[8] V. Subramanian, S. Uluagac, H. Cam, and R. Beyah, “Examining the characteristics and implications of sensor side channels,” in 2013 IEEE International Conference on Communications (ICC),, pp. 2205-2210. [OpenAIRE]

[9] R. Hasan, N. Saxena, T. Haleviz, S. Zawoad, and D. Rinehart, “Sensing-enabled channels for hard-to-detect command and control of mobile devices,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013, pp. 469- 480.

[10] R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and X. Wang, “Soundcomber: A stealthy and context-aware sound trojan for smartphones.” NDSS, vol. 11, pp. 17-33, 2011.

[11] L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 1, p. 3, 2009.

[12] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(smart) watch your taps: side-channel keystroke inference attacks using smartwatches,” in Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, pp. 27-30. [OpenAIRE]

[13] S. M. Del Pozo, F.-X. Standaert, D. Kamel, and A. Moradi, “Sidechannel attacks from static power: When should we care?” in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp. 145-150.

[14] A. S. Uluagac, V. Subramanian, and R. Beyah, “Sensory channel threats to cyber physical systems: A wake-up call,” in 2014 IEEE Conference on Communications and Network Security (CNS), pp. 301-309. [OpenAIRE]

[15] G. Petracca, A.-A. Reineh, Y. Sun, J. Grossklags, and T. Jaeger, “Aware: Preventing abuse of privacy-sensitive sensors via operation bindings,” 2017.

103 references, page 1 of 7
Any information missing or wrong?Report an Issue