{"title":"管理物联网安全的技术和非技术视角集成模型","authors":"M. Suryanegara, Nur Hayati","doi":"10.1145/3357419.3357450","DOIUrl":null,"url":null,"abstract":"Security and data privacy are two inseparable issues regarding Internet of Things (IoT) implementation. Most research discusses the method of overcoming these issues by utilizing IoT reference architectures, namely application, network, and perception layers. Studies present information about what kind of attacks appear in each IoT layer followed by how to prevent and mitigate said attacks. Moreover, some researchers conduct inquiries in regard to security issues emerging in cross layers and the integration of multi-layer architecture. In this research, we try to use different perspectives to examine the problems and solutions concerning IoT security. We involve technical and non-technical elements for managing these problems and propose an integrated model in which actors---regulators, industry, and users---actively participate in addressing security and data privacy issues that arise on every IoT architecture.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security\",\"authors\":\"M. Suryanegara, Nur Hayati\",\"doi\":\"10.1145/3357419.3357450\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and data privacy are two inseparable issues regarding Internet of Things (IoT) implementation. Most research discusses the method of overcoming these issues by utilizing IoT reference architectures, namely application, network, and perception layers. Studies present information about what kind of attacks appear in each IoT layer followed by how to prevent and mitigate said attacks. Moreover, some researchers conduct inquiries in regard to security issues emerging in cross layers and the integration of multi-layer architecture. In this research, we try to use different perspectives to examine the problems and solutions concerning IoT security. We involve technical and non-technical elements for managing these problems and propose an integrated model in which actors---regulators, industry, and users---actively participate in addressing security and data privacy issues that arise on every IoT architecture.\",\"PeriodicalId\":261951,\"journal\":{\"name\":\"Proceedings of the 9th International Conference on Information Communication and Management\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 9th International Conference on Information Communication and Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3357419.3357450\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Conference on Information Communication and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3357419.3357450","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security
Security and data privacy are two inseparable issues regarding Internet of Things (IoT) implementation. Most research discusses the method of overcoming these issues by utilizing IoT reference architectures, namely application, network, and perception layers. Studies present information about what kind of attacks appear in each IoT layer followed by how to prevent and mitigate said attacks. Moreover, some researchers conduct inquiries in regard to security issues emerging in cross layers and the integration of multi-layer architecture. In this research, we try to use different perspectives to examine the problems and solutions concerning IoT security. We involve technical and non-technical elements for managing these problems and propose an integrated model in which actors---regulators, industry, and users---actively participate in addressing security and data privacy issues that arise on every IoT architecture.