Security Requirements Analysis for the IoT

被引:0
|
作者
Oh, Se-Ra [1 ]
Kim, Young-Gab [1 ]
机构
[1] Sejong Univ, Secur Engn Lab, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Internet of Things; Security Requirements; INTERNET; CHALLENGES; PRIVACY; THINGS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the rapid growth of network infrastructure and sensor, the age of the IoT (internet of things) that can be implemented into the smart car, smart home, smart building, and smart city is coming. IoT is a very useful ecosystem that provides various services (e.g., amazon echo); however, at the same time, risk can be huge too. Collecting information to help people could lead serious information leakage, and if IoT is combined with critical control system (e.g., train control system), security attack would cause loss of lives. Furthermore, research on IoT security requirements is insufficient now. Therefore, this paper focuses on IoT security, and its requirements. First, we propose basic security requirements of IoT by analyzing three basic characteristics (i.e., heterogeneity, resource constraint, dynamic environment). Then, we suggest six key elements of IoT (i.e., IoT network, cloud, user, attacker, service, platform) and analyze their security issues for overall security requirements. In addition, we evaluate several IoT security requirement researches.
引用
收藏
页码:305 / 310
页数:6
相关论文
共 50 条
  • [21] Reasoning About Inter-procedural Security Requirements in IoT Applications
    Paccamiccio, Mattia
    Mostarda, Leonardo
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 3, 2022, 451 : 245 - 254
  • [22] A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
    Hansch, Gerhard
    Schneider, Peter
    Fischer, Kai
    Boettinger, Konstantin
    [J]. 2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 325 - 332
  • [23] SINETStream: Enabling Research IoT Applications with Portability, Security and Performance Requirements
    Takefusa, Atsuko
    Sun, Jingtao
    Fujiwara, Ikki
    Yoshida, Hiroshi
    Aida, Kento
    Pu, Calton
    [J]. 2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 482 - 492
  • [24] Encryption Standards for security system in Energy Harvesting for IoT requirements - Review
    Arun, V.
    Reddy, D. Laxma
    Srinivas, S.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1224 - 1227
  • [25] A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
    Sudha, K. Swapna
    Jeyanthi, N.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 50 - 72
  • [26] AN ANALYSIS OF SECURITY PERSPECTIVE IN INDUSTRIAL IOT
    Kavitha, R.
    Malathi, R.
    Ramesh, S. S. Subashka
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 773 - 781
  • [27] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [28] Serverless Security Analysis for IoT Applications
    Ortega Candel, Jose Manuel
    Mora Gimeno, Francisco Jose
    Mora Mora, Higinio
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022), 2023, 594 : 393 - 400
  • [29] Comparative Analysis of Security Protocols in IoT
    Alazzawi, Saif Saffah Badr
    Siddiqui, Tamanna
    [J]. INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY (ICICCT 2021), 2021, 1417 : 76 - 86
  • [30] Analysis of IoT Platform Security: A Survey
    Yu, Jin-Yong
    Kim, Young-Gab
    [J]. 2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 139 - 143