Phantom Device Attack: Uncovering the Security Implications of the Interactions among Devices, IoT Cloud, and Mobile Apps.
Wei ZhouYan JiaYao YaoLipeng ZhuLe GuanYuhang MaoPeng LiuYuqing ZhangPublished in: CoRR (2018)
Keyphrases
- mobile apps
- cloud computing
- business models
- mobile applications
- cyber attacks
- security problems
- trust relationships
- mobile devices
- key management
- smart phones
- information security
- rfid tags
- data center
- big data
- access control
- management system
- security policies
- secret key
- intrusion detection
- coverage includes
- m learning
- data security
- ddos attacks
- mobile learning
- data management
- mobile computing
- data integrity
- database security
- mobile phone