Skip to main content

2018 | OriginalPaper | Buchkapitel

Devices Can Be Secure and Easy to Install on the Internet of Things

verfasst von : Roger D. Chamberlain, Mike Chambers, Darren Greenwalt, Brett Steinbrueck, Todd Steinbrueck

Erschienen in: Integration, Interconnection, and Interoperability of IoT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

One of the major issues that must be addressed in the emerging Internet of Things (IoT) is balancing the needs of security and reasonable installation and maintenance efforts. Security is crucial, as evidenced by the fact that IoT devices are frequent targets of attack. However, if the security infrastructure is not relatively easy to use, it will ultimately be compromised by users who are unwilling (or insufficiently motivated) to deal with the complexity of ensuring security. This paper describes the industrial deployment experience of the EZConnect™ security infrastructure implemented by BECS Technology, Inc., a firm that provides water chemistry monitoring and control equipment to the aquatics market.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of 9th Conference on Computer and Communications Security, pp. 217–224. ACM, New York, NY, USA (2002). doi:10.1145/586110.586140 Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of 9th Conference on Computer and Communications Security, pp. 217–224. ACM, New York, NY, USA (2002). doi:10.​1145/​586110.​586140
4.
Zurück zum Zitat BECSys EZConnect™ Application Note. Technical Report ENG-6072-DOC, BECS Technology, Inc., St. Louis, MO, USA (2016) BECSys EZConnect™ Application Note. Technical Report ENG-6072-DOC, BECS Technology, Inc., St. Louis, MO, USA (2016)
5.
Zurück zum Zitat Binnie, C.: Linux Server Security: Hack and Defend. Wiley Inc, Indianapolis, IN, USA (2016)CrossRef Binnie, C.: Linux Server Security: Hack and Defend. Wiley Inc, Indianapolis, IN, USA (2016)CrossRef
6.
Zurück zum Zitat Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa S.D.J. (eds.) Proceedings of IFIP TC-13 11th International Human-Computer Interaction Conference, Part II, pp. 114–126. Springer, Berlin (2007). doi:10.1007/978-3-540-74800-7_9 Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa S.D.J. (eds.) Proceedings of IFIP TC-13 11th International Human-Computer Interaction Conference, Part II, pp. 114–126. Springer, Berlin (2007). doi:10.​1007/​978-3-540-74800-7_​9
9.
Zurück zum Zitat Cui, A., Stolfo, S.J.: Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. In: Proceedings of 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 8–18. ACM, New York, NY, USA (2011). doi:10.1145/1978672.1978674 Cui, A., Stolfo, S.J.: Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. In: Proceedings of 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 8–18. ACM, New York, NY, USA (2011). doi:10.​1145/​1978672.​1978674
14.
Zurück zum Zitat Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 591–600. ACM, New York, NY, USA (2006). doi:10.1145/1124772.1124862 Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 591–600. ACM, New York, NY, USA (2006). doi:10.​1145/​1124772.​1124862
16.
Zurück zum Zitat Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011). doi:10.1007/s11277-011-0385-5 CrossRef Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011). doi:10.​1007/​s11277-011-0385-5 CrossRef
17.
Zurück zum Zitat Hertzum, M., Jørgensen, N., Nørgaard, M.: Usable security and e-banking: ease of use vis-a-vis security. Australasian J. Inf. Syst. 11(2) (2004). doi:10.3127/ajis.v11i2.124 Hertzum, M., Jørgensen, N., Nørgaard, M.: Usable security and e-banking: ease of use vis-a-vis security. Australasian J. Inf. Syst. 11(2) (2004). doi:10.​3127/​ajis.​v11i2.​124
18.
Zurück zum Zitat Herzog, A., Shahmehri, N.: Usability and security of personal firewalls. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of IFIP TC-11 22nd International Information Security Conference, pp. 37–48. Springer, Boston, MA, USA (2007). doi:10.1007/978-0-387-72367-9_4 Herzog, A., Shahmehri, N.: Usability and security of personal firewalls. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of IFIP TC-11 22nd International Information Security Conference, pp. 37–48. Springer, Boston, MA, USA (2007). doi:10.​1007/​978-0-387-72367-9_​4
19.
Zurück zum Zitat Just, M., Aspinall, D.: Personal choice and challenge questions: a security and usability assessment. In: Proceedings of 5th Symposium on Usable Privacy and Security, pp. 8:1–8:11. ACM, New York, NY, USA (2009). doi:10.1145/1572532.1572543 Just, M., Aspinall, D.: Personal choice and challenge questions: a security and usability assessment. In: Proceedings of 5th Symposium on Usable Privacy and Security, pp. 8:1–8:11. ACM, New York, NY, USA (2009). doi:10.​1145/​1572532.​1572543
20.
Zurück zum Zitat Kleidermacher, D., Kleidermacher, M.: Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development. Elsevier, Waltham, MA, USA (2012) Kleidermacher, D., Kleidermacher, M.: Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development. Elsevier, Waltham, MA, USA (2012)
21.
Zurück zum Zitat Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Inc, Indianapolis, IN, USA (2010) Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Inc, Indianapolis, IN, USA (2010)
24.
Zurück zum Zitat Li, N., Kinebuchi, Y., Nakajima, T.: Enhancing security of embedded Linux on a multi-core processor. In: IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications, vol. 2, pp. 117–121. IEEE, New York (2011). doi:10.1109/RTCSA.2011.36 Li, N., Kinebuchi, Y., Nakajima, T.: Enhancing security of embedded Linux on a multi-core processor. In: IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications, vol. 2, pp. 117–121. IEEE, New York (2011). doi:10.​1109/​RTCSA.​2011.​36
27.
Zurück zum Zitat Medaglia, C., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds.) The Internet of Things, pp. 389–395. Springer, New York (2010). doi:10.1007/978-1-4419-1674-7_38 Medaglia, C., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds.) The Internet of Things, pp. 389–395. Springer, New York (2010). doi:10.​1007/​978-1-4419-1674-7_​38
29.
Zurück zum Zitat Nielsen, J.: Finding usability problems through heuristic evaluation. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 373–380. ACM, New York, NY, USA (1992). doi:10.1145/142750.142834 Nielsen, J.: Finding usability problems through heuristic evaluation. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 373–380. ACM, New York, NY, USA (1992). doi:10.​1145/​142750.​142834
30.
Zurück zum Zitat Palensky, P., Sauter, T.: Security considerations for FAN-Internet connections. In: Proceedings of IEEE International Workshop on Factory Communication Systems, pp. 27–35. IEEE, New York (2000). doi:10.1109/WFCS.2000.882530 Palensky, P., Sauter, T.: Security considerations for FAN-Internet connections. In: Proceedings of IEEE International Workshop on Factory Communication Systems, pp. 27–35. IEEE, New York (2000). doi:10.​1109/​WFCS.​2000.​882530
31.
Zurück zum Zitat Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: Proceedings of International Conference on Distributed Computing in Sensor Systems, pp. 351–355. IEEE, New York (2013). doi:10.1109/DCOSS.2013.78 Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: Proceedings of International Conference on Distributed Computing in Sensor Systems, pp. 351–355. IEEE, New York (2013). doi:10.​1109/​DCOSS.​2013.​78
32.
Zurück zum Zitat Ristić, I.: Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications. Feisty Duck, London, UK (2015) Ristić, I.: Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications. Feisty Duck, London, UK (2015)
36.
Zurück zum Zitat Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: Ongoing challenges and research opportunities. In: Proceedings of 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE, New York (2014). doi:10.1109/SOCA.2014.58 Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: Ongoing challenges and research opportunities. In: Proceedings of 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE, New York (2014). doi:10.​1109/​SOCA.​2014.​58
Metadaten
Titel
Devices Can Be Secure and Easy to Install on the Internet of Things
verfasst von
Roger D. Chamberlain
Mike Chambers
Darren Greenwalt
Brett Steinbrueck
Todd Steinbrueck
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-61300-0_4

Neuer Inhalt