Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

Mark Patton, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

105 Scopus citations

Abstract

The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added to the internet. The addition of these devices, and their remote connectivity, has brought a new level of efficiency into our lives. However, the security of these devices has come into question. While many may be secure, the sheer number creates an environment where even a small percentage of insecure devices may create significant vulnerabilities. This paper evaluates some of the emerging vulnerabilities that exist and puts some figures to the scale of the threat.

Original languageEnglish (US)
Title of host publicationProceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages232-235
Number of pages4
ISBN (Electronic)9781479963645
DOIs
StatePublished - Dec 4 2014
Event2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014 - The Hague, Netherlands
Duration: Sep 24 2014Sep 26 2014

Publication series

NameProceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014

Other

Other2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014
Country/TerritoryNetherlands
CityThe Hague
Period9/24/149/26/14

Keywords

  • Internet of Things
  • IoT
  • SCADA
  • Shodan

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Uninvited connections: A study of vulnerable devices on the internet of things (IoT)'. Together they form a unique fingerprint.

Cite this