Loading [MathJax]/extensions/TeX/mhchem.js
Concatenating Unprotected Internet of Things Network Event-Driven Data to Obtain End-User Information | IEEE Conference Publication | IEEE Xplore

Concatenating Unprotected Internet of Things Network Event-Driven Data to Obtain End-User Information


Abstract:

This research demonstrates how to monitor an Internet of Things (IoT) construct and use the data captured from the network's IoT devices to gather information about end-u...Show More

Abstract:

This research demonstrates how to monitor an Internet of Things (IoT) construct and use the data captured from the network's IoT devices to gather information about end-users in the operating environment. The purpose for this study is to expose unsophisticated capabilities that malicious entities can perform when the aggregation of the raw data created from the low-level processing operation of IoT devices is not properly protected and kept confidential. Additionally, this work is not conducting threat analysis or threat modeling in depth for the given events within the IoT network. Focus on threat mitigation will be explored in future work. However, what is explored is the capability to gather vital information pertaining to the end-users in the operating environment when there are little to no security methods enforced, thus validating the reason to employ security measures like threat mitigation techniques to protect IoT constructs. As a result, information pertaining to device network usage, end-user data services usage, smart device log information and visual images of the end-user where all capabilities that could be assessed via the raw data capture being collected from the individual IoT sub nodes.
Date of Conference: 31 July 2017 - 03 August 2017
Date Added to IEEE Xplore: 18 September 2017
ISBN Information:
Conference Location: Vancouver, BC, Canada

References

References is not available for this document.