Never ending story: Authentication and access control design flaws in shared IoT devices

23Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Internet-of-Things (IoT) devices implement weak authentication and access control schemes. The on-demand nature of IoT devices requires a responsive communications channel, which is often at odds with thorough authentication and access control. This paper seeks to better understand IoT device security by examining the design of authentication and access control schemes. In this work, we explore the challenge of propagating credential revocation and access control list modifications in a shared IoT ecosystem. We evaluate the vulnerability of 19 popular security cameras and doorbells against a straightforward user-interface bound adversary attack. Our results demonstrate that 16 of 19 surveyed devices suffer from flaws that enable unauthorized access after credential modification or revocation. We conclude by discussing these findings and propose a means for balancing authentication and access control schemes while still offering responsive communications channels.

Cite

CITATION STYLE

APA

Janes, B., Crawford, H., & Oconnor, T. J. (2020). Never ending story: Authentication and access control design flaws in shared IoT devices. In Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020 (pp. 104–109). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW50608.2020.00033

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free