2020
DOI: 10.3390/s20205897
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements for the Internet of Things: A Systematic Approach

Abstract: There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 99 publications
(56 citation statements)
references
References 154 publications
(200 reference statements)
0
55
0
1
Order By: Relevance
“…Static though the hot water tank may seem just now, it could be invited like other material or organic items to become digitally intelligent. As part of the algorithmic internet of things (AIoT) it joins 'a paradigm shift where anything and everything can be interconnected via a communication medium' and 'security is a prime concern' (Pal et al, 2020). Therefore, I question what reforms are needed to inclusivity policies (that still centre around human-to-human discriminatory practices) to now be inclusive of a hybrid assemblage of devices and potential data bias, that humans now intimately interconnect with (Hayes, in press).…”
Section: The Many Faces Of Postdigitalmentioning
confidence: 99%
“…Static though the hot water tank may seem just now, it could be invited like other material or organic items to become digitally intelligent. As part of the algorithmic internet of things (AIoT) it joins 'a paradigm shift where anything and everything can be interconnected via a communication medium' and 'security is a prime concern' (Pal et al, 2020). Therefore, I question what reforms are needed to inclusivity policies (that still centre around human-to-human discriminatory practices) to now be inclusive of a hybrid assemblage of devices and potential data bias, that humans now intimately interconnect with (Hayes, in press).…”
Section: The Many Faces Of Postdigitalmentioning
confidence: 99%
“…It is noted that the process of human emotion recognition deals with personal information including health, location, and other highly confidential information. It is even more significant when considering large-scale IoT systems and their association with different human emotion recognition systems for securing access control and the delegation of access rights at scale [ 157 , 158 , 159 ]. Therefore, the protection of a user’s privacy is another challenge [ 154 , 160 ].…”
Section: Current Trends and Future Directionsmentioning
confidence: 99%
“…Therefore, an OS for IoT device should be lightweight to support the minimal hardware, yet following the security requirements, as suggested by Pal et al [26], which includes energy awareness, security by privacy, location privacy, storage, communication, scalability by incremental deployment, load balancing, robustness, fault tolerance, connectivity, and usability. Linux flavors and distributions such as Ubuntu Segment Type Description PT_NULL PT_NULL allows program header table to contain entries that can be ignored during execution PT_LOAD PT_LOAD is used to define a loadable segment using the values specified by p_memsz & p_filesz.…”
Section: Iot Malware Backgroundmentioning
confidence: 99%