Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability.
Gustavo CasqueiroSayed Erfan ArefinTasnia Heya AshrafiAbdul SerwaddaHassan WasswaPublished in: TPS-ISA (2022)
Keyphrases
- security problems
- buffer overflow
- security vulnerabilities
- sensor technology
- key management
- sensor data
- security risks
- risk assessment
- management system
- sensor networks
- access control
- human operators
- security policies
- penetration testing
- wireless sensor
- statistical databases
- multi sensor
- real time
- information security
- database
- data security
- data fusion
- network security
- intrusion detection
- security properties
- security requirements
- rfid systems
- database systems
- security issues
- computer networks
- security mechanisms
- human body
- cloud computing
- low cost