Maamar, Z, Kajan, E, Asim, M and Baker, T (2019) Open Challenges in Vetting the Internet-of-Things. Internet Technology Letters. ISSN 2476-1508
|
Text
Open_Challenges_in_Vetting_the_Internet_of_Things.pdf - Accepted Version Download (123kB) | Preview |
Abstract
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to connect things such as physical devices and objects together. A huge number of things (6.4 billion are in use in 2016) are already acting without direct human control raising a lot of concerns about the readiness and appropriateness of existing security practices, techniques, and tools to secure the data collected and protect people’s private lives. As a first step, this paper presses the importance of having a dedicated process for vetting IoT (by analogy to vetting mobile apps) with focus on exposing things’ vulnerabilities that could be the primary source of attacks. These vulnerabilities are identified according to things’ duties decomposed into sensing, actuating, and communicating. A set of questions shed light on things’ vulnerabilities per type of duty.
Item Type: | Article |
---|---|
Additional Information: | This is the peer reviewed version of the following article: Maamar, Z, Kajan, E, Asim, M, Baker Shamsa, T. Open challenges in vetting the internet‐of‐things. Internet Technology Letters. 2019;e129. https://doi.org/10.1002/itl2.129 , which has been published in final form at https://dx.doi.org/10.1002/itl2.129. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | Wiley |
Date Deposited: | 13 Aug 2019 10:33 |
Last Modified: | 04 Sep 2021 09:00 |
DOI or ID number: | 10.1002/itl2.129 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/11191 |
View Item |