Internet of Things (IoT): Smart and Secure Service Delivery

被引:94
作者
Bertino, Elisa [1 ]
Choo, Kim-Kwang Raymond [2 ]
Georgakopolous, Dimitrios [3 ]
Nepal, Surya [4 ]
机构
[1] Purdue Univ, CS Dept, LWSN Bldg, W Lafayette, IN 47907 USA
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Swinburne Univ Technol, Dept Comp Sci & Software Engn, Hawthorn, Vic 3122, Australia
[4] CSIRO Data61, Corner Vimiera & Pembroke Rd, Marsfield, NSW 2122, Australia
关键词
Applied Cryptography; Network Security; Internet of things; security and privacy;
D O I
10.1145/3013520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The information captured by IoT present an unprecedented opportunity to solve large-scale problems in those application domains to deliver services; example applications include precision agriculture, environment monitoring, smart health, smart manufacturing, and smart cities. Like all other Internet based services in the past, IoT-based services are also being developed and deployed without security consideration. By nature, IoT devices and services are vulnerable tomalicious cyber threats as they cannot be given the same protection that is received by enterprise services within an enterprise perimeter. While IoT services will play an important role in our daily life resulting in improved productivity and quality of life, the trend has also "encouraged" cyber-exploitation and evolution and diversification of malicious cyber threats. Hence, there is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section. Several potential research topics are also identified in this special section.
引用
收藏
页数:7
相关论文
共 22 条
[1]  
[Anonymous], 2009, ADV INFORM SECURITY
[2]  
Bertino Elisa, 2016, P EDBT 2016
[3]  
Boyd C., 2003, Information Security and Cryptography Series
[4]  
CSA, 2015, ID ACC MAN INT THING
[5]   A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) :2174-2186
[6]   Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems [J].
Duan, Li ;
Liu, Dongxi ;
Zhang, Yang ;
Chen, Shiping ;
Liu, Ren Ping ;
Cheng, Bo ;
Chen, Junliang .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
[7]   Design and Implementation of an Intrusion Response System for Relational Databases [J].
Kamra, Ashish ;
Bertino, Elisa .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (06) :875-888
[8]  
Lentz M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P925
[9]   DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System [J].
Li, Beibei ;
Lu, Rongxing ;
Wang, Wei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2415-2425
[10]   IoT Middleware: A Survey on Issues and Enabling Technologies [J].
Ngu, Anne H. ;
Gutierrez, Mario ;
Metsis, Vangelis ;
Nepal, Surya ;
Sheng, Quan Z. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :1-20