Open challenges in vetting the internet-of-things

被引:3
|
作者
Maamar, Zakaria [1 ]
Kajan, Ejub [2 ]
Asim, Muhammad [3 ]
Shamsa, Thar Baker [4 ]
机构
[1] Zayed Univ, Coll Technol Innovat, POB 19282, Dubai, U Arab Emirates
[2] State Univ Novi Pazar, Dept Comp Sci, Novi Pazar, Serbia
[3] Natl Univ Comp & Emerging Sci, Islamabad, Pakistan
[4] Liverpool John Moores Univ, Dept Comp Sci, Liverpool, Merseyside, England
关键词
duty; internet-of-things; mobile apps; threat; vetting; vulnerability;
D O I
10.1002/itl2.129
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of internetwork to connect things such as physical devices and objects together. A huge number of things (6.4 billion are in use in 2016) are already acting without direct human control raising a lot of concerns about the readiness and appropriateness of existing security practices, techniques, and tools to secure the data collected and protect people's private lives. As a first step, this paper presses the importance of having a dedicated process for vetting IoT (by analogy to vetting mobile apps) with focus on exposing things' vulnerabilities that could be the primary source of attacks. These vulnerabilities are identified according to things' duties decomposed into sensing, actuating, and communicating. A set of questions shed light on things' vulnerabilities per type of duty.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Internet-of-Things: Technology Evolution and Challenges
    Ma, Jianguo
    [J]. 2014 IEEE MTT-S INTERNATIONAL MICROWAVE SYMPOSIUM (IMS), 2014,
  • [2] INTERNET-OF-THINGS: GENESIS, CHALLENGES AND APPLICATIONS
    Matta, Priya
    Pant, Bhasker
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1717 - 1750
  • [3] Advances and Emerging Challenges in Cognitive Internet-of-Things
    Li, Feng
    Lam, Kwok-Yan
    Li, Xiuhua
    Sheng, Zhengguo
    Hua, Jingyu
    Wang, Li
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) : 5489 - 5496
  • [4] Cybernetics, Complexity, and the Challenges to the Realization of the Internet-of-Things
    Schuck, Tod M.
    [J]. BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 45 - 54
  • [5] OpenIoT: Open Source Internet-of-Things in the Cloud
    Soldatos, John
    Kefalakis, Nikos
    Hauswirth, Manfred
    Serrano, Martin
    Calbimonte, Jean-Paul
    Riahi, Mehdi
    Aberer, Karl
    Jayaraman, Prem Prakash
    Zaslavsky, Arkady
    Zarko, Ivana Podnar
    Skorin-Kapov, Lea
    Herzog, Reinhard
    [J]. INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS, 2015, 9001 : 13 - 25
  • [6] Identity in the Internet-of-Things (IoT): New Challenges and Opportunities
    Lam, Kwok-Yan
    Chi, Chi-Hung
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 18 - 26
  • [7] Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges
    Farahmandpour, Zeinab
    Versteeg, Steve
    Han, Jun
    Kameswaran, Anand
    [J]. 2017 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON RAPID CONTINUOUS SOFTWARE ENGINEERING (RCOSE), 2017, : 32 - 35
  • [8] RF and Microwave Technology Challenges for Internet-of-Things Applications
    Larson, L.
    [J]. 2015 IEEE 15TH TOPICAL MEETING ON SILICON MONOLITHIC INTEGRATED CIRCUITS IN RF SYSTEMS (SIRF), 2015, : 61 - 62
  • [9] Challenges and Solutions for Future Internet-of-Things Semiconductor Technologies
    Schaeffer, J. K.
    [J]. SILICON COMPATIBLE MATERIALS, PROCESSES, AND TECHNOLOGIES FOR ADVANCED INTEGRATED CIRCUITS AND EMERGING APPLICATIONS 6, 2016, 72 (04): : 17 - 21
  • [10] Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice
    Kejun Chen
    Shuai Zhang
    Zhikun Li
    Yi Zhang
    Qingxu Deng
    Sandip Ray
    Yier Jin
    [J]. Journal of Hardware and Systems Security, 2018, 2 (2) : 97 - 110