Home > Research > Publications & Outputs > Towards an Understanding of Emerging Cyber Secu...

Electronic data

Links

Text available via DOI:

View graph of relations

Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT. / Shaw, Peter Andrew; Mikusz, Mateusz; Trotter, Ludwig Korbinian; Harding, Michael Paul; Davies, Nigel Andrew Justin.

Living in the Internet of Things: Cybersecurity of the IoT. IET, 2019. (Living in the Internet of Things: Cybersecurity of the IoT).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Shaw, PA, Mikusz, M, Trotter, LK, Harding, MP & Davies, NAJ 2019, Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT. in Living in the Internet of Things: Cybersecurity of the IoT. Living in the Internet of Things: Cybersecurity of the IoT, IET. https://doi.org/10.1049/cp.2019.0158

APA

Shaw, P. A., Mikusz, M., Trotter, L. K., Harding, M. P., & Davies, N. A. J. (2019). Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT. In Living in the Internet of Things: Cybersecurity of the IoT (Living in the Internet of Things: Cybersecurity of the IoT). IET. https://doi.org/10.1049/cp.2019.0158

Vancouver

Shaw PA, Mikusz M, Trotter LK, Harding MP, Davies NAJ. Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT. In Living in the Internet of Things: Cybersecurity of the IoT. IET. 2019. (Living in the Internet of Things: Cybersecurity of the IoT). https://doi.org/10.1049/cp.2019.0158

Author

Shaw, Peter Andrew ; Mikusz, Mateusz ; Trotter, Ludwig Korbinian ; Harding, Michael Paul ; Davies, Nigel Andrew Justin. / Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT. Living in the Internet of Things: Cybersecurity of the IoT. IET, 2019. (Living in the Internet of Things: Cybersecurity of the IoT).

Bibtex

@inproceedings{b552b73e45a6414497bf2431353418f1,
title = "Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT",
abstract = "The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey outlining the limitations of the existing body of work regarding the mapping of the IoT and conducting an appropriate threat analysis. We subsequently applied the STRIDE model to two case studies (smart campus and urban environment) to identify a set of potential vulnerabilities and approaches at addressing these issues in the context of IoT maps.",
author = "Shaw, {Peter Andrew} and Mateusz Mikusz and Trotter, {Ludwig Korbinian} and Harding, {Michael Paul} and Davies, {Nigel Andrew Justin}",
year = "2019",
month = may,
day = "1",
doi = "10.1049/cp.2019.0158",
language = "English",
isbn = "9781839530890",
series = "Living in the Internet of Things: Cybersecurity of the IoT",
publisher = "IET",
booktitle = "Living in the Internet of Things: Cybersecurity of the IoT",

}

RIS

TY - GEN

T1 - Towards an Understanding of Emerging Cyber Security Threats in Mapping the IoT

AU - Shaw, Peter Andrew

AU - Mikusz, Mateusz

AU - Trotter, Ludwig Korbinian

AU - Harding, Michael Paul

AU - Davies, Nigel Andrew Justin

PY - 2019/5/1

Y1 - 2019/5/1

N2 - The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey outlining the limitations of the existing body of work regarding the mapping of the IoT and conducting an appropriate threat analysis. We subsequently applied the STRIDE model to two case studies (smart campus and urban environment) to identify a set of potential vulnerabilities and approaches at addressing these issues in the context of IoT maps.

AB - The increase in IoT sensing and actuating devices that are seamlessly integrated into the environment is often leading to a mistrust of users as it becomes impossible to spot deployed IoT devices and understand their purposes and capabilities. One approach is to provide an appropriate mechanism of mapping the IoT and address stakeholder requirements. However, providing comprehensive maps of the IoT may expose a number of vulnerabilities that need to be addressed. We conducted a comprehensive literature survey outlining the limitations of the existing body of work regarding the mapping of the IoT and conducting an appropriate threat analysis. We subsequently applied the STRIDE model to two case studies (smart campus and urban environment) to identify a set of potential vulnerabilities and approaches at addressing these issues in the context of IoT maps.

U2 - 10.1049/cp.2019.0158

DO - 10.1049/cp.2019.0158

M3 - Conference contribution/Paper

SN - 9781839530890

T3 - Living in the Internet of Things: Cybersecurity of the IoT

BT - Living in the Internet of Things: Cybersecurity of the IoT

PB - IET

ER -