Skip to Main content Skip to Navigation
Conference papers

Sweet Dreams and Nightmares: Security in the Internet of Things

Abstract : Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have been found in commercial products that enable to bypass the security mechanisms. Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the overall security of a system. At hand of several examples of assailable commercial products we demonstrate the potential impact of the found security weaknesses and illustrate “how to not do it”.
Document type :
Conference papers
Complete list of metadata

Cited literature [11 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Tuesday, November 22, 2016 - 4:17:16 PM
Last modification on : Wednesday, November 23, 2016 - 8:47:43 AM
Long-term archiving on: : Monday, March 20, 2017 - 9:13:26 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Timo Kasper, David Oswald, Christof Paar. Sweet Dreams and Nightmares: Security in the Internet of Things. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.1-9, ⟨10.1007/978-3-662-43826-8_1⟩. ⟨hal-01400916⟩



Record views


Files downloads