2018
DOI: 10.1007/978-3-030-01150-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…In the context of the well-documented cybersecurity risk assessment field, there is a plethora of standardised frameworks and guidelines that aim to capture and document the cyber risks which are triggered as a result of vulnerabilities, attacks and technical flaws that emerge from the cyber field. In addition, there is a wide spectrum of works that focus on the analysis of cyber-physical systems, but they revolve around the cyber threats of those systems [56,57]. Hence, the connection between the two worlds, and the assessment of risks as a result of cascading actions, which are triggered from actors or events in the physical world and may have an impact to the cyber dimension, is a research domain with major challenges and room for innovation.…”
Section: Cybersecurity and Privacy Risk Assessment: The Road Aheadmentioning
confidence: 99%
“…In the context of the well-documented cybersecurity risk assessment field, there is a plethora of standardised frameworks and guidelines that aim to capture and document the cyber risks which are triggered as a result of vulnerabilities, attacks and technical flaws that emerge from the cyber field. In addition, there is a wide spectrum of works that focus on the analysis of cyber-physical systems, but they revolve around the cyber threats of those systems [56,57]. Hence, the connection between the two worlds, and the assessment of risks as a result of cascading actions, which are triggered from actors or events in the physical world and may have an impact to the cyber dimension, is a research domain with major challenges and room for innovation.…”
Section: Cybersecurity and Privacy Risk Assessment: The Road Aheadmentioning
confidence: 99%
“…Any pervasive mobile communication framework needs to take privacy and anonymity into account [98][99][100]. Pervasive sensing applications require the cooperation of strangers who will not trust each other [17] and, therefore, incentives to back such schemes are essential [101][102][103].…”
Section: Privacy and Anonymitymentioning
confidence: 99%
“…Mostly, in smart homes [8] and smart o ces, people may be irritated by wearing the device on them all the time. Tag-based localization is highly prone to the leakage of privacy and personal information, e.g., a person's daily routine [9][10][11][12]. Many techniques have been proposed for the localization of non-cooperative targets such as thermal infrared sensors, pressure sensors, sound source, light sensors, electric eld, ultrasonic sensors, and radio frequency-(RF-) based localization schemes [13][14][15].…”
Section: Introductionmentioning
confidence: 99%