Accepted author manuscript, 181 KB, PDF document
Available under license: None
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT
AU - Shaw, Peter Andrew
AU - Mikusz, Mateusz
AU - Trotter, Ludwig Korbinian
AU - Harding, Michael Paul
AU - Davies, Nigel Andrew Justin
PY - 2019/5/1
Y1 - 2019/5/1
N2 - The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey outlining the limitations of the existing body of work regarding the mapping of the IoT and conducting an appropriate threat analysis. We subsequently applied the STRIDE model to two case studies (smart campus and urban environment) to identify a set of potential vulnerabilities and approaches at addressing these issues in the context of IoT maps.
AB - The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey outlining the limitations of the existing body of work regarding the mapping of the IoT and conducting an appropriate threat analysis. We subsequently applied the STRIDE model to two case studies (smart campus and urban environment) to identify a set of potential vulnerabilities and approaches at addressing these issues in the context of IoT maps.
U2 - 10.1049/cp.2019.0158
DO - 10.1049/cp.2019.0158
M3 - Conference contribution/Paper
SN - 9781839530890
T3 - Living in the Internet of Things: Cybersecurity of the IoT
BT - Living in the Internet of Things: Cybersecurity of the IoT
PB - IET
ER -