All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.
Bhaskar TejaswiMohammad MannanAmr M. YoussefPublished in: CODASPY (2023)
Keyphrases
- management system
- security problems
- key management
- cloud computing
- smart objects
- mobile devices
- security issues
- big data
- mobile agent system
- information security
- network management
- security mechanisms
- security requirements
- security management
- data security
- security policies
- risk analysis
- data management
- data processing
- access control
- decision making
- information systems
- ad hoc networks
- rfid systems
- service management
- security protocols
- mobile platforms
- cyber attacks
- decision support
- embedded systems
- computer networks
- information management
- statistical databases
- intrusion detection
- wireless sensor
- intrusion detection system
- rfid tags
- enterprise wide
- location information
- web services
- network security