2017
DOI: 10.1007/978-981-10-5861-5_8
|View full text |Cite
|
Sign up to set email alerts
|

A Case for IoT Security Assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…According to Leuker et al [1], risks related to security, trust, privacy and identity management are major challenges in today's IoT systems. Assessing the quality and security risks of IoT systems however is not a simple task, and due to devices having constraints on cost, time to market and functionality developers of these devices often disregard this assessment [2]. Because IoT systems typically operate in highly dynamic environments, they need to be able to continuously evolve and adapt, to ensure and increase their trustworthiness.…”
Section: Motivationmentioning
confidence: 99%
“…According to Leuker et al [1], risks related to security, trust, privacy and identity management are major challenges in today's IoT systems. Assessing the quality and security risks of IoT systems however is not a simple task, and due to devices having constraints on cost, time to market and functionality developers of these devices often disregard this assessment [2]. Because IoT systems typically operate in highly dynamic environments, they need to be able to continuously evolve and adapt, to ensure and increase their trustworthiness.…”
Section: Motivationmentioning
confidence: 99%
“…Assurance evaluation of IoT systems (and more in general of CPSs) is still in its infancy. The research community has first worked on providing security approaches for CPSs 29,30 , and only in the last couple of years some preliminary assurance approaches emerged 31,32,33 . The difficulties in defining new approaches to IoT assurance are due to the fact that the peculiarities of IoT applications make existing assurance approaches for the cloud unusable.…”
Section: Related Workmentioning
confidence: 99%
“…Also, the system under evaluation shows a precise perimeter with known topology. Ardagna et al 32 first discussed challenges in the design and development of assurance techniques for IoT, proposing a conceptual framework and architecture for IoT security assurance evaluation. Sato et al 33 investigated the problem of trust establishment in IoT and proposed an architecture for evaluating “ area‐wise trust ”, where the trust level considers device identification, monitoring of device behaviors, connection process to devices, and connection protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Research on IoT-based systems assurance is however at an early stage, and mainly focused on defining new assurance architectures for IoT. Ardagna et al [4] first discussed challenges in the design and development of assurance techniques for IoT, proposing a conceptual framework and architecture for IoT security assurance evaluation. Sato et al.…”
Section: Introductionmentioning
confidence: 99%