Skip to main content

2018 | OriginalPaper | Buchkapitel

The Dual Role of Smartphones in IoT Security

verfasst von : Kui Ren

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The world is entering the era of Internet of Things (IoT), where the interconnected physical devices of various forms, often embedded with electronics, software, sensors, actuators, etc., jointly perform sophisticated sensing and computing tasks and provide unprecedented services. Centering around this new paradigm is the ubiquitous smartphone. Equipped with abundant sensing, computing and networking capabilities, the smartphone is widely recognised as one of the key enablers towards IoT and the driving force that brings a great many innovative services under the way.
Despite the promising aspects, along with the rise of IoT is the increasing concerns on cybersecurity. The smartphone in this new context, however, plays a very intriguing dual role, due to the fact that it is deeply interleaved into almost every aspect of our daily living. On the one hand, it could be used as a low-cost attacking device, trying to penetrate into the scenarios that have never been considered before. On the other hand, it is also the first line of defense in the security forefront. In both cases, we need to carefully study and comprehensively understand the capability of smartphones, as well as their security implications. In this talk, we will use two examples to illustrate this observation and hopefully promote further researches along this line.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Song, C., Lin, F., Ba, Z., Ren, K., Zhou, C., Xu, W.: My smartphone knows what you print: exploring smartphone-based side-channel attacks against 3D printers. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 895–907. ACM (2016) Song, C., Lin, F., Ba, Z., Ren, K., Zhou, C., Xu, W.: My smartphone knows what you print: exploring smartphone-based side-channel attacks against 3D printers. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 895–907. ACM (2016)
4.
Zurück zum Zitat Chen, S., Ren, K., Piao, S., Wang, C., Wang, Q., Weng, J., Su, L., Mohaisen, A.: You can hear but you cannot steal: defending against voice impersonation attacks on smartphones. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 183–195 (2017) Chen, S., Ren, K., Piao, S., Wang, C., Wang, Q., Weng, J., Su, L., Mohaisen, A.: You can hear but you cannot steal: defending against voice impersonation attacks on smartphones. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 183–195 (2017)
5.
Zurück zum Zitat Anderson, P., Sherman, C.A.: A discussion of new business models for 3D printing. Int. J. Technol. Mark. 2, 280–294 (2007)CrossRef Anderson, P., Sherman, C.A.: A discussion of new business models for 3D printing. Int. J. Technol. Mark. 2, 280–294 (2007)CrossRef
6.
Zurück zum Zitat Hou, J.U., Kim, D.G., Choi, S., Lee, H.K.: 3D print-scan resilient watermarking using a histogram-based circular shift coding structure. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 115–121 (2015) Hou, J.U., Kim, D.G., Choi, S., Lee, H.K.: 3D print-scan resilient watermarking using a histogram-based circular shift coding structure. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 115–121 (2015)
7.
Zurück zum Zitat Savitzky, A., Golay, M.J.: Smoothing and differentiation of data by simplified least squares procedures. Anal. Chem. 36, 1627–1639 (1964)CrossRef Savitzky, A., Golay, M.J.: Smoothing and differentiation of data by simplified least squares procedures. Anal. Chem. 36, 1627–1639 (1964)CrossRef
8.
Zurück zum Zitat Lee, K.B., Grice, R.A.: The design and development of user interfaces for voice application in mobile devices. In: Proceedings of IEEE International Professional Communication Conference, pp. 308–320 (2006) Lee, K.B., Grice, R.A.: The design and development of user interfaces for voice application in mobile devices. In: Proceedings of IEEE International Professional Communication Conference, pp. 308–320 (2006)
10.
Zurück zum Zitat Stylianou, Y.: Voice transformation: a survey. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3585–3588 (2009) Stylianou, Y.: Voice transformation: a survey. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3585–3588 (2009)
11.
Zurück zum Zitat Wu, Z., Li, H.: Voice conversion and spoofing attack on speaker verification systems. In: Proceedings of IEEE Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 1–9 (2013) Wu, Z., Li, H.: Voice conversion and spoofing attack on speaker verification systems. In: Proceedings of IEEE Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), pp. 1–9 (2013)
12.
Zurück zum Zitat Alegre, F., Vipperla, R., Evans, N., Fauve, B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp. 36–40 (2012) Alegre, F., Vipperla, R., Evans, N., Fauve, B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp. 36–40 (2012)
13.
Zurück zum Zitat Evans, N., Yamagishi, J., Kinnunen, T.: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics. IEEE Signal Processing Society Speech and Language Technical Committee Newsletter, May 2013 Evans, N., Yamagishi, J., Kinnunen, T.: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics. IEEE Signal Processing Society Speech and Language Technical Committee Newsletter, May 2013
14.
Zurück zum Zitat Villalba, J., Lleida, E.: Preventing replay attacks on speaker verification systems. In: Proceedings of IEEE International Carnahan Conference on Security Technology (ICCST), pp. 1–8 (2011) Villalba, J., Lleida, E.: Preventing replay attacks on speaker verification systems. In: Proceedings of IEEE International Carnahan Conference on Security Technology (ICCST), pp. 1–8 (2011)
15.
Zurück zum Zitat Wang, Z.F., Wei, G., He, Q.H.: Channel pattern noise based playback attack detection algorithm for speaker recognition. In: Proceedings of IEEE International Conference on Machine Learning and Cybernetics (ICMLC), vol. 4, pp. 1708–1713 (2011) Wang, Z.F., Wei, G., He, Q.H.: Channel pattern noise based playback attack detection algorithm for speaker recognition. In: Proceedings of IEEE International Conference on Machine Learning and Cybernetics (ICMLC), vol. 4, pp. 1708–1713 (2011)
Metadaten
Titel
The Dual Role of Smartphones in IoT Security
verfasst von
Kui Ren
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_3

Premium Partner