Sweet Dreams and Nightmares: Security in the Internet of Things

Abstract : Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have been found in commercial products that enable to bypass the security mechanisms. Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the overall security of a system. At hand of several examples of assailable commercial products we demonstrate the potential impact of the found security weaknesses and illustrate “how to not do it”.
Document type :
Conference papers
Complete list of metadatas

Cited literature [11 references]  Display  Hide  Download

https://hal.inria.fr/hal-01400916
Contributor : Hal Ifip <>
Submitted on : Tuesday, November 22, 2016 - 4:17:16 PM
Last modification on : Wednesday, November 23, 2016 - 8:47:43 AM
Long-term archiving on : Monday, March 20, 2017 - 9:13:26 PM

File

978-3-662-43826-8_1_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Timo Kasper, David Oswald, Christof Paar. Sweet Dreams and Nightmares: Security in the Internet of Things. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.1-9, ⟨10.1007/978-3-662-43826-8_1⟩. ⟨hal-01400916⟩

Share

Metrics

Record views

147

Files downloads

240