隐私和安全:物联网可持续发展的关键要求

F. Assaderaghi, Gowri Chindalore, Brima Ibrahim, Hans de Jong, M. Joye, Sami Nassar, Wolfgang Steinbauer, Mathias Wagner, Thomas Wille
{"title":"隐私和安全:物联网可持续发展的关键要求","authors":"F. Assaderaghi, Gowri Chindalore, Brima Ibrahim, Hans de Jong, M. Joye, Sami Nassar, Wolfgang Steinbauer, Mathias Wagner, Thomas Wille","doi":"10.23919/VLSIT.2017.7998185","DOIUrl":null,"url":null,"abstract":"As IoT moves beyond a catchphrase and starts to provide meaningful solutions in multiple fields, three of its critical pillars are now well understood: • Transducers are needed as means of interacting with the environment and machines, and in converting stimuli to data and vice versa. These sensors and actuators form the basis of contextual awareness. • Given that many end-node IoT devices are size and power constrained, local low-power computing is essential. The need for power-efficient end-node and edge computing becomes more apparent when latency, network bandwidth, and real time analytics are considered. • Low power communication links to transmit the data between IoT devices and local aggregators or cloud resources form the third pillar. Missing in this picture, and not fully appreciated yet, is the fourth pillar of IoT: privacy and security (P&S). If IoT is all about data, how P&S is treated will determine IoT's fate: a second phase of rapid proliferation or ultimate demise and collapse. Recent breaches in P&S are starting to change the industry's view on this issue. Even IoT end nodes that are low cost and have limited functionality pose significant risk to the entire system when their security is breached. This is due to the networking nature of the IoT that exposes a massive attack surface, making these devices ideal attack points for causing disruptions and stealing sensitive data. PC-era Internet security has been an expensive afterthought that has cost industry and consumers billions of dollars. Therefore, we should approach IoT differently, making P&S a key requirement at the design phase itself, and address all life-cycle aspects from initial deployment to in-field updates, to end-of-life decommissioning. This is a system level challenge that requires complete end-end HW/SW solutions, developed in partnership with the entire ecosystem.","PeriodicalId":333275,"journal":{"name":"2017 Symposium on VLSI Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Privacy and security: Key requirements for sustainable IoT growth\",\"authors\":\"F. Assaderaghi, Gowri Chindalore, Brima Ibrahim, Hans de Jong, M. Joye, Sami Nassar, Wolfgang Steinbauer, Mathias Wagner, Thomas Wille\",\"doi\":\"10.23919/VLSIT.2017.7998185\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As IoT moves beyond a catchphrase and starts to provide meaningful solutions in multiple fields, three of its critical pillars are now well understood: • Transducers are needed as means of interacting with the environment and machines, and in converting stimuli to data and vice versa. These sensors and actuators form the basis of contextual awareness. • Given that many end-node IoT devices are size and power constrained, local low-power computing is essential. The need for power-efficient end-node and edge computing becomes more apparent when latency, network bandwidth, and real time analytics are considered. • Low power communication links to transmit the data between IoT devices and local aggregators or cloud resources form the third pillar. Missing in this picture, and not fully appreciated yet, is the fourth pillar of IoT: privacy and security (P&S). If IoT is all about data, how P&S is treated will determine IoT's fate: a second phase of rapid proliferation or ultimate demise and collapse. Recent breaches in P&S are starting to change the industry's view on this issue. Even IoT end nodes that are low cost and have limited functionality pose significant risk to the entire system when their security is breached. This is due to the networking nature of the IoT that exposes a massive attack surface, making these devices ideal attack points for causing disruptions and stealing sensitive data. PC-era Internet security has been an expensive afterthought that has cost industry and consumers billions of dollars. Therefore, we should approach IoT differently, making P&S a key requirement at the design phase itself, and address all life-cycle aspects from initial deployment to in-field updates, to end-of-life decommissioning. This is a system level challenge that requires complete end-end HW/SW solutions, developed in partnership with the entire ecosystem.\",\"PeriodicalId\":333275,\"journal\":{\"name\":\"2017 Symposium on VLSI Technology\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Symposium on VLSI Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/VLSIT.2017.7998185\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Symposium on VLSI Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/VLSIT.2017.7998185","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

随着物联网超越流行语,开始在多个领域提供有意义的解决方案,它的三个关键支柱现在得到了很好的理解:•换能器需要作为与环境和机器交互的手段,以及将刺激转换为数据,反之亦然。这些传感器和执行器构成了上下文感知的基础。•鉴于许多终端节点物联网设备的尺寸和功率受到限制,本地低功耗计算是必不可少的。当考虑到延迟、网络带宽和实时分析时,对节能终端节点和边缘计算的需求变得更加明显。第三个支柱是低功耗通信链路,用于在物联网设备和本地聚合器或云资源之间传输数据。在这幅图景中,物联网的第四大支柱——隐私和安全(P&S)尚未得到充分认识。如果物联网完全是关于数据的,那么如何处理P&S将决定物联网的命运:快速扩散或最终消亡和崩溃的第二阶段。最近P&S的违规行为开始改变业界对这个问题的看法。即使是低成本且功能有限的物联网终端节点,当其安全性被破坏时,也会对整个系统构成重大风险。这是由于物联网的网络特性暴露了巨大的攻击面,使这些设备成为造成中断和窃取敏感数据的理想攻击点。个人电脑时代的互联网安全一直是一个昂贵的事后考虑,已经让行业和消费者损失了数十亿美元。因此,我们应该以不同的方式处理物联网,使P&S成为设计阶段本身的关键要求,并解决从初始部署到现场更新到生命周期结束退役的所有生命周期方面的问题。这是一个系统级的挑战,需要与整个生态系统合作开发完整的端到端硬件/软件解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Privacy and security: Key requirements for sustainable IoT growth
As IoT moves beyond a catchphrase and starts to provide meaningful solutions in multiple fields, three of its critical pillars are now well understood: • Transducers are needed as means of interacting with the environment and machines, and in converting stimuli to data and vice versa. These sensors and actuators form the basis of contextual awareness. • Given that many end-node IoT devices are size and power constrained, local low-power computing is essential. The need for power-efficient end-node and edge computing becomes more apparent when latency, network bandwidth, and real time analytics are considered. • Low power communication links to transmit the data between IoT devices and local aggregators or cloud resources form the third pillar. Missing in this picture, and not fully appreciated yet, is the fourth pillar of IoT: privacy and security (P&S). If IoT is all about data, how P&S is treated will determine IoT's fate: a second phase of rapid proliferation or ultimate demise and collapse. Recent breaches in P&S are starting to change the industry's view on this issue. Even IoT end nodes that are low cost and have limited functionality pose significant risk to the entire system when their security is breached. This is due to the networking nature of the IoT that exposes a massive attack surface, making these devices ideal attack points for causing disruptions and stealing sensitive data. PC-era Internet security has been an expensive afterthought that has cost industry and consumers billions of dollars. Therefore, we should approach IoT differently, making P&S a key requirement at the design phase itself, and address all life-cycle aspects from initial deployment to in-field updates, to end-of-life decommissioning. This is a system level challenge that requires complete end-end HW/SW solutions, developed in partnership with the entire ecosystem.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信