Detection and response to data exfiltration from internet of things android devices

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Hackers can exfiltrate sensitive data stored in an IoT device such as Android smartphones. He/She abuses the Android pairing mode and targets a personal computer system previously trusted by the device user. The existing protocols that allow file transfer from Android IoT devices to the computer cannot detect this attack. In this paper, we propose an approach to detect attacks exploiting trusted relationship between a third party system such as personal computer and an Android device to exfiltrate user data from the victim device to an attacker. We implement a protocol to secure communication between IoT Android device and third party system. Our approach has been proved to be effective in detecting these category of attacks with reasonable performance overheads.

Cite

CITATION STYLE

APA

Graa, M., Kome, I. M. L., Cuppens-Boulahia, N., Cuppens, F., & Frey, V. (2018). Detection and response to data exfiltration from internet of things android devices. In IFIP Advances in Information and Communication Technology (Vol. 529, pp. 339–354). Springer. https://doi.org/10.1007/978-3-319-99828-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free