Emerging security threats and countermeasures in IoT

Zhi Kai Zhang, Michael Cheng Yi Cho, Shiuh-Pyng Shieh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

80 Scopus citations

Abstract

IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level. As sensitive and private information exchanged between things, privacy becomes a major concern. Among many important issues, scalability, transparency, and reliability are considered as new challenges that differentiate IoT from the conventional Internet. In this paper, we enumerate the IoT communication scenarios and investigate the threats to the large-scale, unreliable, pervasive computing environment. To cope with these new challenges, the conventional security architecture will be revisited. In particular, various authentication schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data.

Original languageEnglish
Title of host publicationASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1-6
Number of pages6
ISBN (Electronic)9781450332453
DOIs
StatePublished - 14 Apr 2015
Event10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015 - Singapore, Singapore
Duration: 14 Apr 201517 Apr 2015

Publication series

NameASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security

Conference

Conference10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015
Country/TerritorySingapore
CitySingapore
Period14/04/1517/04/15

Keywords

  • Authentication
  • Communication
  • IoT
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Emerging security threats and countermeasures in IoT'. Together they form a unique fingerprint.

Cite this