2017
DOI: 10.1109/msp.2017.3151346
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?

Abstract: Abstract-The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles? And, what are the new problems and challenges in this space that require new security mechanisms? This article summarizes the intellectual similarities and dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(38 citation statements)
references
References 10 publications
0
38
0
Order By: Relevance
“…Against this background, the IoT fundamentally challenges the field of IS security and privacy, requiring the redefinition of well-established rules and organizational practices to protect sensor data (Fernandes, Rahmati, Eykholt, & Prakash, 2017;Singh, Pasquier, Bacon, Ko, & Eyers, 2016). The confidentiality and integrity of data are essential to security and privacy to ensure that personal data cannot be viewed or manipulated by objectionable third parties (Anderson et al, 2017;Baskerville & Siponen, 2002;Chellappa & Pavlou, 2002).…”
Section: Security and Privacy In The Internet Of Thingsmentioning
confidence: 99%
“…Against this background, the IoT fundamentally challenges the field of IS security and privacy, requiring the redefinition of well-established rules and organizational practices to protect sensor data (Fernandes, Rahmati, Eykholt, & Prakash, 2017;Singh, Pasquier, Bacon, Ko, & Eyers, 2016). The confidentiality and integrity of data are essential to security and privacy to ensure that personal data cannot be viewed or manipulated by objectionable third parties (Anderson et al, 2017;Baskerville & Siponen, 2002;Chellappa & Pavlou, 2002).…”
Section: Security and Privacy In The Internet Of Thingsmentioning
confidence: 99%
“…Another approach is given in the TCP/IP model [21], [22], which is frequently used for internet communications because it is a simplified vision of the OSI layer model by only using four layers. The figure 2 shows a representation of both versions In the field of the IoT, [23] proposes an IoT stack as the combination of four main components: the physical layer, the IoT platform, the communication protocols/technologies and the application layer. Instead, [24] suggests an architecture based on three main layers: the perception layer, the network layer, and the application layer.…”
Section: Wireless Smart Home Protocolsmentioning
confidence: 99%
“…The rise of mobile and wearable computing, and the increasing advancements of connected Internet of Things (IoT) has created new opportunities and challenges for security and privacy. Recent research in IoT security and privacy has focused on software engineering security practices [1,2], patching networked devices [3], access control policy specification, and redesigning IoTbased authentication for sharing passwords among multiple users for unlocking devices [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…In this respect, researchers have attempted to provide an alternative to textual passwords by proposing graphical password systems which ask users to complete an image-based task to login. Graphical passwords have shown to have good usability and security characteristics [2] and are now being widely adopted, e.g., Windows 10 picture password. Many graphical password systems have been proposed (see [7] for a review) which either require users to sketch a secret image or pattern on the screen [11,12], or select and recognize pictures on a grid [13], or provide users with various cues (visual, verbal, and spatial) to assist the recognition of system-assigned keywords [19].…”
Section: Introductionmentioning
confidence: 99%