IoE Security Threats and You

نویسندگان

  • Jungwoo Ryoo
  • Soyoung Kim
  • Junsung Cho
  • Hyoungshick Kim
  • Simon Tjoa
  • Christopher V. DeRobertis
چکیده

Internet of Everything (IoE) is a newly emerging trend especially in homes. Marketing forces towards smart homes are also accelerating the spread of IoE devices in households. An obvious danger of rapid adoption of these gadgets is that many of them lack controls for protecting the privacy and security of end users from attacks designed to disrupt lives and incur financial losses. Our research goal for this paper is to develop an IoE threat model geared specifically for home users who are often unaware of the privacy and security threats which the IoE appliances pose. Our ultimate goal is to propose an effective solution to alerting users of imminent IoE security threats and offering actionable steps to mitigate them through an intuitive and friendly user interface design. There have been ample security research on individual elements of IoE. In particular, there are many publications on Internet of Things (IoT) security. What differentiates our research from the existing IoT works is that we are treating IoT as a component of an IoE ecosystem and developing our threat model in the more comprehensive context of how other pieces of the equation, such as people and data as well as processes fit together to result in formidable security threats.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Devising a Secure Architecture of Internet of Everything (Ioe) to Avoid the Data Exploitation in Cross Culture Communications

The communication infrastructure among various interconnected devices has revolutionized the process of collecting and sharing information. This evolutionary paradigm of collecting, storing and analyzing data streams is called the Internet of Everything (IoE). The information exchange through IoE is fast and accurate but leaves security issues. The emergence of IoE has seen a drift from a singl...

متن کامل

The executive guide to information security - threats, challenges and solutions

Any books that you read, no matter how you got the sentences that have been read from the books, surely they will give you goodness. But, we will show you one of recommendation of the book that you need to read. This the executive guide to information security threats challenges and solutions is what we surely mean. We will show you the reasonable reasons why you need to read this book. This bo...

متن کامل

Nonsecurity Considerations in Security Decisions

• You can have as much security as you want – What are you willing to give up to get it? • Security always involves trade-offs – If no airplanes flew, 9/11 couldn't have happened – Gated communities offer more security but less privacy • We make decisions every day about these trade-offs • To do it thoughtfully, we must understand: – How security works – The threats and risks – The costs

متن کامل

6 Wireless Threats to Your Business

If you think a promiscuous client is a scantily-dressed customer, you're in trouble. And I'm not talking about having an affair. Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it's not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and tar...

متن کامل

Addressing insider threat using "where you are" as fourth factor authentication

Current physical and cybersecurity systems have been relying on traditional three factor authentication to mitigate the threats posed by insider attacks. Typically, systems use one or two of the following factors to authenticate end-users: what you know (e.g., password), what you have (e.g., RSA ID), or what you are (e.g., fingerprint). Systems based on these factors have the following limitati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017