{"title":"Major Impacts of Key Reinstallation Attack on Internet of Things System","authors":"Asma Terkawi, Nisreen Innab","doi":"10.1109/NCG.2018.8593071","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is one of the emerging technologies that has seized the attention of researchers. The reason behind that was the fact that the IoT was expected to be applied in our daily life in the near future and humans will be wholly dependent on this technology for comfort and an easy life style. The standard Internet protocols raise significant challenges that could stand in the way of realising potential IoT benefits. In this paper, we introduced and discussed the major impacts of existing internet protocols vulnerably on the IoT system especially the venerability of the WPA2 protocol (cryptographic protocol) as one of the most crucial aspects of security and privacy in the IoT. Ways to mitigate the impact of the attack are then proposed.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 21st Saudi Computer Society National Computer Conference (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCG.2018.8593071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The Internet of Things (IoT) is one of the emerging technologies that has seized the attention of researchers. The reason behind that was the fact that the IoT was expected to be applied in our daily life in the near future and humans will be wholly dependent on this technology for comfort and an easy life style. The standard Internet protocols raise significant challenges that could stand in the way of realising potential IoT benefits. In this paper, we introduced and discussed the major impacts of existing internet protocols vulnerably on the IoT system especially the venerability of the WPA2 protocol (cryptographic protocol) as one of the most crucial aspects of security and privacy in the IoT. Ways to mitigate the impact of the attack are then proposed.