Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2494091.2499770acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
tutorial

Adaptive security and privacy management for the internet of things (ASPI 2013)

Published: 08 September 2013 Publication History

Abstract

The Internet of Things (IoT) was initially proposed to connect specific things via the Internet using devices, such as RFID readers, to realise intelligent identification and management. This vision has since expanded to include a more diverse range of devices, services and networks to become an Internet of anything, anywhere, connected, anyhow. Security and privacy management for the IoT remains a core challenge.
Many IoT devices maybe may have zero or minimal security by design because they are low resource, low power devices, designed to work as closed vertical services. Security threats and risks may be higher because devices are unattended, use local wireless communication that have no or weak encryption making them more susceptible to eavesdropping and because users find security too unusable to setup and operate and hence leave devices relatively unsecure. It may also be less problematic to reproduce and fake data sources, access nodes and data sinks that interact with IoT devices in order to attack devices or the services they access. Devices can be moved between or removed from private, communal, public and hostile physical spaces. There is a higher risk of a loss of privacy for human users and organisations because of an increased ability to eavesdrop, because of wireless networks with soft boundaries, and because embedded environment devices can sense smaller amounts of physical trails with a greater degree of sensitivity and accuracy. A specific focus is on the need for IoT security to adapt. The adaptation has multiple dimensions. We can adapt existing conventional security models to more effectively secure an IoT. We can adapt security pre-planned and unplanned context changes such as different moving around in different physical spaces. IoT systems can be designed to self-adapt. IoT systems need to adapt to the active (re) configuration and maintenance of IoT devices and systems of devices by users and by artificial agents.
The proposed workshop intends to bring together researchers and practitioners from relevant fields to present and disseminate the latest on-going research focussing on adapting security, privacy & management for the Internet of Things. It aims to facilitate knowledge transfer and synergy, bridge gaps between different research communities and groups, to lay down foundation for common purposes, and to help identify opportunities and challenges for interested researchers and technology and system developers.

References

[1]
Abie, H. and Balasingham, I. 2012. Risk-Based Adaptive Security for Smart IoT in eHealth. I: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3, pp. 269--275
[2]
Hong, J., Ng, J., Lederer, S., and Landay, J. 2004. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In D. Benyon; P. Moody; D. Gruen and I. McAra-McWilliam (Eds.): Proc. of the 2004 conference on Designing interactive systems: processes, practices, methods, and techniques, (August 1, 2004), NY, pp. 91--100.
[3]
Kozlov, D., Veijalainen, J., and Ali, Y. 2012. Security and privacy threats in IoT architectures. In Proceedings of the 7th International Conference on Body Area Networks (BodyNets '12). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, pp. 256--262.
[4]
4. Medaglia, C. M., and Serbanati, A. 2010. An Overview of Privacy and Security Issues in the Internet of Things. In The Internet of Things, 5, pp. 389--395.
[5]
Roman,R., Najera, P., and Lopez, J. 2011. Securing the Internet of Things. In IEEE Computer, 44, 9, 51--58.

Cited By

View all
  • (2021)IoT Sensing for Reality-Enhanced Serious Games, a Fuel-Efficient Drive Use CaseSensors10.3390/s2110355921:10(3559)Online publication date: 20-May-2021
  • (2021)A Survey on Privacy Preservation in Fog-Enabled Internet of ThingsACM Computing Surveys10.1145/347455455:1(1-39)Online publication date: 23-Nov-2021
  • (2021)Semantics-Driven Safety Measures in Distributed Big Data Systems on IoTAdvanced Computational Paradigms and Hybrid Intelligent Computing10.1007/978-981-16-4369-9_26(251-259)Online publication date: 7-Dec-2021
  • Show More Cited By

Index Terms

  1. Adaptive security and privacy management for the internet of things (ASPI 2013)

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UbiComp '13 Adjunct: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
      September 2013
      1608 pages
      ISBN:9781450322157
      DOI:10.1145/2494091
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 September 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. internet of things
      2. privacy
      3. security
      4. ubiquitous computing
      5. user centred management

      Qualifiers

      • Tutorial

      Conference

      UbiComp '13
      Sponsor:

      Acceptance Rates

      UbiComp '13 Adjunct Paper Acceptance Rate 254 of 399 submissions, 64%;
      Overall Acceptance Rate 764 of 2,912 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)IoT Sensing for Reality-Enhanced Serious Games, a Fuel-Efficient Drive Use CaseSensors10.3390/s2110355921:10(3559)Online publication date: 20-May-2021
      • (2021)A Survey on Privacy Preservation in Fog-Enabled Internet of ThingsACM Computing Surveys10.1145/347455455:1(1-39)Online publication date: 23-Nov-2021
      • (2021)Semantics-Driven Safety Measures in Distributed Big Data Systems on IoTAdvanced Computational Paradigms and Hybrid Intelligent Computing10.1007/978-981-16-4369-9_26(251-259)Online publication date: 7-Dec-2021
      • (2020)SAFERProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/34141734:3(1-22)Online publication date: 4-Sep-2020
      • (2019)Exploring Fuzzy Logic and Random Forest for Car Drivers’ Fuel Consumption Estimation in IoT-Enabled Serious Games2019 IEEE 14th International Symposium on Autonomous Decentralized System (ISADS)10.1109/ISADS45777.2019.9155706(1-7)Online publication date: Apr-2019
      • (2019)A Provable Semi-Outsourcing Privacy Preserving Scheme for Data Transmission From IoT DevicesIEEE Access10.1109/ACCESS.2019.29254037(87169-87177)Online publication date: 2019
      • (2019)Towards a Reality-Enhanced Serious Game to Promote Eco-Driving in the WildGames and Learning Alliance10.1007/978-3-030-34350-7_24(245-255)Online publication date: 1-Nov-2019
      • (2019)FIREWORK: Fog Orchestration for Secure IoT NetworksSecurity and Privacy in New Computing Environments10.1007/978-3-030-21373-2_23(311-317)Online publication date: 8-Jun-2019
      • (2017)Designing a Micro-Moving Target IPv6 Defense for the Internet of ThingsProceedings of the Second International Conference on Internet-of-Things Design and Implementation10.1145/3054977.3054997(179-184)Online publication date: 18-Apr-2017
      • (2017)Integrating PNC and RLNC for BSM dissemination in VANETs2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2017.8292738(1-5)Online publication date: Oct-2017
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media