Sweet Dreams and Nightmares: Security in the Internet of Things - Information Security Theory and Practice: Securing the Internet of Things Access content directly
Conference Papers Year : 2014

Sweet Dreams and Nightmares: Security in the Internet of Things


Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes. In the past years, various vulnerabilities have been found in commercial products that enable to bypass the security mechanisms. Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the overall security of a system. At hand of several examples of assailable commercial products we demonstrate the potential impact of the found security weaknesses and illustrate “how to not do it”.
Fichier principal
Vignette du fichier
978-3-662-43826-8_1_Chapter.pdf (245.76 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01400916 , version 1 (22-11-2016)





Timo Kasper, David Oswald, Christof Paar. Sweet Dreams and Nightmares: Security in the Internet of Things. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.1-9, ⟨10.1007/978-3-662-43826-8_1⟩. ⟨hal-01400916⟩
397 View
213 Download



Gmail Facebook X LinkedIn More