Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Open Challenges in Vetting the Internet-of-Things

Maamar, Z, Kajan, E, Asim, M and Baker, T Open Challenges in Vetting the Internet-of-Things. Internet Technology Letters. ISSN 2476-1508 (Accepted)

[img] Text
Open_Challenges_in_Vetting_the_Internet_of_Things.pdf - Accepted Version
Restricted to Repository staff only

Download (123kB)

Abstract

Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to connect things such as physical devices and objects together. A huge number of things (6.4 billion are in use in 2016) are already acting without direct human control raising a lot of concerns about the readiness and appropriateness of existing security practices, techniques, and tools to secure the data collected and protect people’s private lives. As a first step, this paper presses the importance of having a dedicated process for vetting IoT (by analogy to vetting mobile apps) with focus on exposing things’ vulnerabilities that could be the primary source of attacks. These vulnerabilities are identified according to things’ duties decomposed into sensing, actuating, and communicating. A set of questions shed light on things’ vulnerabilities per type of duty.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science
Publisher: Wiley
Date Deposited: 13 Aug 2019 10:33
Last Modified: 13 Aug 2019 10:45
URI: http://researchonline.ljmu.ac.uk/id/eprint/11191

Actions (login required)

View Item View Item