Challenges to Securing the Internet of Things

被引:0
|
作者
Stout, William M. S. [1 ]
Urias, Vincent E. [1 ]
机构
[1] Sandia Natl Labs, POB 5800, Albuquerque, NM 87185 USA
关键词
internet of things; cyber security; physical security; cloud; data center; software defined networking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Great advances in technology have paved the way for the computerization and interconnectedness of the world around us. The Internet of Things (IoT) describes a network comprised of physical objects or "things" embedded with electronics, software, sensors and connectivity to achieve greater value and service by exchanging data with manufacturers, users, and/or other connected devices. However, it is often the case that some of these devices are constrained by limited processing power, memory, and power consumption. These limitations may enable adverse effects as the IoT becomes pervasive, reaching into infrastructure, vehicles, and homes. As history has shown, the architects of the Internet were focused primarily on the efficiency and scaling aspects of data transfer protocols; at the dawn of the Internet, network and computer security were vacant research areas. The current trend shows the IoT market growing at an accelerated rate - will security again become an afterthought? The goal of this paper is to provide to not only a better understanding of the various IoT domains, but to survey the shortcomings and challenges to securing IoT devices and their interactions with cloud and enterprise applications.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] Feasibility of Societal Model for Securing Internet of Things
    Tsunoda, Hiroshi
    Roman, Rodrigo
    Lopez, Javier
    Keeni, Glenn Mansfield
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (08): : 3567 - 3588
  • [32] Securing Manufacturing Intelligence for the Industrial Internet of Things
    Al-Aqrabi, Hussain
    Hill, Richard
    Lane, Phil
    Aagela, Hamza
    [J]. FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, 2020, 1027 : 267 - 282
  • [33] Securing Internet of Things (IoT) with machine learning
    Zeadally, Sherali
    Tsikerdekis, Michail
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (01)
  • [34] The Specter of Malicious Computing Securing the Internet of Things
    Beresford, Alastair
    Mascolo, Cecilia
    Gruteser, Marco
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 10 - 11
  • [35] A Changing Landscape: Securing the Internet of Things (IoT)
    Jha, Sanjay
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [36] Towards Securing Discovery Services in Internet of Things
    Datta, Soumya Kanti
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
  • [37] Understanding the Challenges in Securing Internet Routing
    Oliveira, Ricardo
    Lad, Mohit
    Zhang, Lixia
    [J]. 2009 9TH ANNUAL INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, 2009, : 145 - +
  • [38] Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
    Honar Pajooh, Houshyar
    Rashid, Mohammad
    Alam, Fakhrul
    Demidenko, Serge
    [J]. SENSORS, 2021, 21 (02) : 1 - 29
  • [39] Securing Internet of Things Devices Using The Network Context
    Trnka, Michal
    Svacina, Jan
    Cerny, Tomas
    Song, Eunjee
    Hong, Jiman
    Bures, Miroslav
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4017 - 4027
  • [40] Securing the Internet of Things (IoT): A Security Taxonomy for IoT
    Rizvi, Syed
    Pfeffer, Joseph, III
    Kurtz, Andrew
    Rizvi, Mohammad
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168