A changing landscape: Securing the Internet of Things (IoT): Keynote talk

S. Jha
{"title":"A changing landscape: Securing the Internet of Things (IoT): Keynote talk","authors":"S. Jha","doi":"10.1109/PERCOMW.2016.7457124","DOIUrl":null,"url":null,"abstract":"First part of this talk will discuss how the community is converging towards the IoT vision having worked in wireless sensor networking and Machine-2-Machine (M2M) communication. This will follow a general discussion of security challenges in IoT. Finally I will discuss some results from an ongoing project on security of bodyworn devices. Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. Securing the data generated by these devices is essential if they are to be integrated into the current health infrastructure and employed in medical applications. In this talk, I will discuss a mechanism to secure data provenance for these devices by exploiting symmetric spatio-temporal characteristics of the wireless link between two communicating parties. Our solution enables both parties to generate closely matching ‘link’ fingerprints, which uniquely associate a data session with a wireless link such that a third party, at a later date, can verify the links the data was communicated on. These fingerprints are very hard for an eavesdropper to forge, lightweight compared to traditional provenance mechanisms, and allow for interesting security properties such as accountability and non-repudiation. I will present our solution with experiments using bodyworn devices in scenarios approximating actual device deployment.","PeriodicalId":448199,"journal":{"name":"PerCom Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"PerCom Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2016.7457124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

First part of this talk will discuss how the community is converging towards the IoT vision having worked in wireless sensor networking and Machine-2-Machine (M2M) communication. This will follow a general discussion of security challenges in IoT. Finally I will discuss some results from an ongoing project on security of bodyworn devices. Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. Securing the data generated by these devices is essential if they are to be integrated into the current health infrastructure and employed in medical applications. In this talk, I will discuss a mechanism to secure data provenance for these devices by exploiting symmetric spatio-temporal characteristics of the wireless link between two communicating parties. Our solution enables both parties to generate closely matching ‘link’ fingerprints, which uniquely associate a data session with a wireless link such that a third party, at a later date, can verify the links the data was communicated on. These fingerprints are very hard for an eavesdropper to forge, lightweight compared to traditional provenance mechanisms, and allow for interesting security properties such as accountability and non-repudiation. I will present our solution with experiments using bodyworn devices in scenarios approximating actual device deployment.
不断变化的环境:保护物联网(IoT):主题演讲
本演讲的第一部分将讨论社区如何在无线传感器网络和机器对机器(M2M)通信中向物联网愿景融合。这将遵循对物联网安全挑战的一般性讨论。最后,我将讨论一个正在进行的关于穿戴式设备安全性的项目的一些结果。无线穿戴式传感设备在健身、运动训练和个性化医疗保健应用中越来越受欢迎。如果要将这些设备集成到当前的卫生基础设施中并用于医疗应用,保护这些设备产生的数据至关重要。在这次演讲中,我将讨论一种机制,通过利用两个通信方之间无线链路的对称时空特征来保护这些设备的数据来源。我们的解决方案使双方都能生成紧密匹配的“链路”指纹,这种指纹将数据会话与无线链路唯一地关联起来,以便第三方在以后可以验证数据通信的链路。这些指纹对于窃听者来说很难伪造,与传统的来源机制相比轻量级,并且允许有趣的安全属性,例如问责制和不可否认性。我将通过在接近实际设备部署的场景中使用穿戴式设备的实验来展示我们的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信