Abstract
With the advent of the Internet of Things era, IoT devices participate in our work environment. From printers, shared files to temperature control, they make our working environment more convenient. Although these IoT devices communicate through different communication protocols, the same identity verification method is often used., hackers can also use this authentication method to steal user identity verification information, This study combines past research results to present our new findings, and further, organize them into a complete attack architecture.
Original language | English |
---|---|
Pages (from-to) | 425-428 |
Number of pages | 4 |
Journal | Proceedings of International Conference on Artificial Life and Robotics |
Volume | 2021 |
Publication status | Published - 2021 |
Event | 26th International Conference on Artificial Life and Robotics, ICAROB 2021 - Beppu, Oita, Japan Duration: 2021 Jan 21 → 2021 Jan 24 |
All Science Journal Classification (ASJC) codes
- Artificial Intelligence
- Computer Vision and Pattern Recognition
- Hardware and Architecture
- Information Systems
- Control and Systems Engineering
- Electrical and Electronic Engineering
- Modelling and Simulation