Security Requirements for Smart Toys

被引:7
作者
de Carvalho, Luciano Goncalves [1 ,2 ]
Eler, Marcelo Medeiros [1 ]
机构
[1] Univ Sao Paulo, Sch Arts Sci & Humanities, Sao Paulo, Brazil
[2] Sao Paulo State Technol Coll, FATEC Mogi das Cruzes, Sao Paulo, Brazil
来源
ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2 | 2017年
关键词
Smart Toys; Toy Computing; Security; Security Requirements;
D O I
10.5220/0006337001440154
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Toys are an essential part of our culture, and they evolve as our technology evolves. Smart toys have been recently introduced in our market as conventional toys equipped with electronic components and sensors that enable wireless network communication with mobile devices that provide services to enhance the toy's functionalities. This environment, also called toy computing, provides users with a more sophisticated and personalised experience since it collects, processes and stores personal information to be used by mobile services and the toy itself. On the other hand, it raises concerns around information security and child safety because unauthorized access to confidential information may bring many consequences. In fact, several security flaws in toy computing have been recently reported in the news due to the absence of clear security policies in this new environment. In this context, this paper presents an analysis of the toy computing environment based on the Microsoft Security Development Lifecycle and its threat modelling tool with the aim of identifying a minimum set of security requirements a smart toy should meet. As result we identified 15 threats and 20 security requirements for toy computing.
引用
收藏
页码:144 / 154
页数:11
相关论文
共 25 条
  • [1] Baraniuk C., 2016, BBC NEWS TECHNOLOGY
  • [2] Biswas D., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P70, DOI 10.1109/PerComW.2012.6197606
  • [3] Broll Gregor, 2007, 16th IST Mobile and Wireless Communications Summit, 2007, P1
  • [4] *CAN PUBL WORKS GO, 2000, PERS INF PROT EL DOC
  • [5] Zapata BC, 2014, IEEE ENG MED BIO, P4956, DOI 10.1109/EMBC.2014.6944736
  • [6] Deloite, 2015, GLOB MOB CONS SURV U
  • [7] Fox-Brewster T., 2016, FORBES SECURITY 0202
  • [8] GAO, 2016, AG NEED IMPR CONTR S
  • [9] Hackett R, 2016, FORTUNE TECH IN 0202
  • [10] Lipner S., 2004, P 20 ANN COMP SEC AP