Keynote: Research Challenges and Opportunities in IoT Security

E. Bertino
{"title":"Keynote: Research Challenges and Opportunities in IoT Security","authors":"E. Bertino","doi":"10.1145/3139531.3139535","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) paradigm refers to the network of physical objects or 'things' embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT makes it possible to sense and control objects creating opportunities for more direct integration between the physical world and computer-based systems. IoT will usher automation in a large number of application domains, ranging from manufacturing and energy management (e.g. SmartGrid), to healthcare management and urban life (e.g. SmartCity). However, because of its fine-grained, continuous and pervasive data acquisition and control capabilities, IoT raises concerns about security. IoT systems are at risk for several reasons. They do not have well defined perimeters, are highly dynamic, and continuously change because of mobility. In addition IoT systems are highly heterogeneous with respect to communication medium and protocols, platforms, and devices. IoT systems may also include 'objects' not designed to be connected to the Internet. Finally, IoT systems, or portions of them, may be physically unprotected and/or controlled by different parties. Attacks, against which there are established defense techniques in the context of conventional information systems and mobile environments, are thus much more difficult to protect against in the IoT. IoT systems thus offer challenging research opportunities in many different areas of cyber security, ranging from cryptographic protocols and public key infrastructures to application and data security. In this talk, after outlining key challenges in IoT security, we present initial approaches to securing IoT data, including firewall techniques to prevent IoT devices from being compromised and used by botnets.","PeriodicalId":295031,"journal":{"name":"Proceedings of the 2017 Workshop on Women in Cyber Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2017 Workshop on Women in Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3139531.3139535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The Internet of Things (IoT) paradigm refers to the network of physical objects or 'things' embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT makes it possible to sense and control objects creating opportunities for more direct integration between the physical world and computer-based systems. IoT will usher automation in a large number of application domains, ranging from manufacturing and energy management (e.g. SmartGrid), to healthcare management and urban life (e.g. SmartCity). However, because of its fine-grained, continuous and pervasive data acquisition and control capabilities, IoT raises concerns about security. IoT systems are at risk for several reasons. They do not have well defined perimeters, are highly dynamic, and continuously change because of mobility. In addition IoT systems are highly heterogeneous with respect to communication medium and protocols, platforms, and devices. IoT systems may also include 'objects' not designed to be connected to the Internet. Finally, IoT systems, or portions of them, may be physically unprotected and/or controlled by different parties. Attacks, against which there are established defense techniques in the context of conventional information systems and mobile environments, are thus much more difficult to protect against in the IoT. IoT systems thus offer challenging research opportunities in many different areas of cyber security, ranging from cryptographic protocols and public key infrastructures to application and data security. In this talk, after outlining key challenges in IoT security, we present initial approaches to securing IoT data, including firewall techniques to prevent IoT devices from being compromised and used by botnets.
主题演讲:物联网安全的研究挑战与机遇
物联网(IoT)范式是指嵌入电子设备、软件、传感器和连接性的物理对象或“事物”网络,使对象能够与服务器、集中式系统和/或基于各种通信基础设施的其他连接设备交换数据。物联网使感知和控制对象成为可能,为物理世界和基于计算机的系统之间更直接的集成创造了机会。物联网将在大量应用领域引入自动化,从制造和能源管理(如智能电网)到医疗保健管理和城市生活(如智能城市)。然而,由于其细粒度、连续和普遍的数据采集和控制能力,物联网引发了对安全性的担忧。物联网系统存在风险有几个原因。它们没有明确的边界,是高度动态的,并且由于流动性而不断变化。此外,物联网系统在通信媒介和协议、平台和设备方面是高度异构的。物联网系统还可能包括不是为连接到互联网而设计的“对象”。最后,物联网系统或其部分可能在物理上不受保护和/或由不同方控制。因此,在传统信息系统和移动环境中存在既定防御技术的攻击,在物联网中更难防御。因此,物联网系统在网络安全的许多不同领域提供了具有挑战性的研究机会,从加密协议和公钥基础设施到应用程序和数据安全。在本次演讲中,在概述了物联网安全的主要挑战之后,我们提出了保护物联网数据的初步方法,包括防止物联网设备被僵尸网络破坏和使用的防火墙技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信