Skip to main content
Top

2019 | OriginalPaper | Chapter

2. Privacy and Security Threats on the Internet of Things

Authors : Sébastien Ziegler, Cédric Crettaz, Eunah Kim, Antonio Skarmeta, Jorge Bernal Bernabe, Ruben Trapero, Stefano Bianchi

Published in: Internet of Things Security and Data Protection

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter will provide an overview of the main threats on IoT systems and deployments. It will address both security and privacy challenges. This chapter will benefit from the contributions derived from several project results, including ANASTACIA and Armour.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
As suggested by analysts, most vendors will soon start applying for certifications for their product portfolios.
 
Literature
2.
go back to reference Top ten strategic technology trends 2017, Gartner, October 2016 Top ten strategic technology trends 2017, Gartner, October 2016
3.
go back to reference Predictions 2017: security and skills will temper growth of IoT, Forrester, 2016 Predictions 2017: security and skills will temper growth of IoT, Forrester, 2016
4.
go back to reference R.H. Weber, Internet of things—new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)MathSciNetCrossRef R.H. Weber, Internet of things—new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)MathSciNetCrossRef
5.
go back to reference M. Haus, M. Waqas, A. Ding, Y. Li, S. Tarkoma, J. Ott, Security and privacy in device to device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)CrossRef M. Haus, M. Waqas, A. Ding, Y. Li, S. Tarkoma, J. Ott, Security and privacy in device to device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)CrossRef
7.
go back to reference Cisco. IoT threat environment—an overview of the IoT threat landscape with risk-based security program recommendations. White paper (2015) Cisco. IoT threat environment—an overview of the IoT threat landscape with risk-based security program recommendations. White paper (2015)
9.
go back to reference Commission staff working document—advancing the Internet of things in Europe, EC, Apr 2016 Commission staff working document—advancing the Internet of things in Europe, EC, Apr 2016
10.
go back to reference R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the Internet of things, 3rd International workshop on Internet of things communications and technologies (IoT-CT), in conjunction with The 10th IEEE WiMob, Oct 2014 R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the Internet of things, 3rd International workshop on Internet of things communications and technologies (IoT-CT), in conjunction with The 10th IEEE WiMob, Oct 2014
11.
go back to reference G. Baldini, A. Skarmeta, et al. Security certification and labelling in Internet of things, 2016 IEEE 3rd WF-IoT, 12–14 Dec 2016 G. Baldini, A. Skarmeta, et al. Security certification and labelling in Internet of things, 2016 IEEE 3rd WF-IoT, 12–14 Dec 2016
12.
go back to reference A. Ahmad, G. Baldini, P. Cousin, S.N. Matheu, A. Skarmeta, E. Fourneret, B. Legeard, Large scale IoT security testing, benchmarking and certification, cognitive hyperconnected digital transformation, Chap. 7, pp. 189–220 A. Ahmad, G. Baldini, P. Cousin, S.N. Matheu, A. Skarmeta, E. Fourneret, B. Legeard, Large scale IoT security testing, benchmarking and certification, cognitive hyperconnected digital transformation, Chap. 7, pp. 189–220
13.
go back to reference A. Ahmad, G. Baldini, P. Cousin, S.N. Matheu, A. Skarmeta, E. Fourneret, B. Legeard,O. Vermesan, J. Bacquet (Eds), Large scale IoT security testing, benchmarking and certification, Cognitive Hyperconnected Digital Transformation (River Publishers, Gistrup) A. Ahmad, G. Baldini, P. Cousin, S.N. Matheu, A. Skarmeta, E. Fourneret, B. Legeard,O. Vermesan, J. Bacquet (Eds), Large scale IoT security testing, benchmarking and certification, Cognitive Hyperconnected Digital Transformation (River Publishers, Gistrup)
14.
go back to reference A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, Challenges for securing cyber physical systems. Proceedings of the Workshop on future directions in cyber-physical systems security (2009), p. 5 A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, Challenges for securing cyber physical systems. Proceedings of the Workshop on future directions in cyber-physical systems security (2009), p. 5
17.
go back to reference E.K. Wang, Y. Ye, X. Xu, S.M. Yiu, L.C.K. Hui, K. P. Chow, Security issues and challenges for cyber physical system. Proceedings of the 2010 IEEE/ACM Int’l conference on green computing and communications & Int’l conference on cyber, physical and social computing. IEEE Computer Society (2010), pp. 733–738 E.K. Wang, Y. Ye, X. Xu, S.M. Yiu, L.C.K. Hui, K. P. Chow, Security issues and challenges for cyber physical system. Proceedings of the 2010 IEEE/ACM Int’l conference on green computing and communications & Int’l conference on cyber, physical and social computing. IEEE Computer Society (2010), pp. 733–738
18.
go back to reference Machine to Machine Communications (M2M), Threat analysis and counter-measures to M2M service layer, ETSI TR 103 167 V0.2.1 (2011-01) Machine to Machine Communications (M2M), Threat analysis and counter-measures to M2M service layer, ETSI TR 103 167 V0.2.1 (2011-01)
19.
go back to reference Y. Gao, Y. Peng, F. Xie, W. Zhao, D. Wang, X. Han et al. Analysis of security threats and vulnerability for cyber-physical systems. In Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference (IEEE, 2013), pp. 50–55 Y. Gao, Y. Peng, F. Xie, W. Zhao, D. Wang, X. Han et al. Analysis of security threats and vulnerability for cyber-physical systems. In Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference (IEEE, 2013), pp. 50–55
20.
go back to reference Mobile Working Group. Security Guidance for Early Adopters of the Internet of Things. (CSA, 2015) Mobile Working Group. Security Guidance for Early Adopters of the Internet of Things. (CSA, 2015)
26.
go back to reference GSMA Security Framework CLP11, February, 2016 GSMA Security Framework CLP11, February, 2016
28.
go back to reference A.M. Zarca, J.B. Bernabe, I. Farris, Y. Khettab, T. Taleb, A. Skarmeta, Enhancing IoT security through network softwarisation and virtual security appliances. Int. J. Netw. Manag. 28(5), e2038 (2018)CrossRef A.M. Zarca, J.B. Bernabe, I. Farris, Y. Khettab, T. Taleb, A. Skarmeta, Enhancing IoT security through network softwarisation and virtual security appliances. Int. J. Netw. Manag. 28(5), e2038 (2018)CrossRef
29.
go back to reference I. Fzarris, J. B. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, B. Sahlin, Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems. 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki (2017), pp. 169–174. doi: https://doi.org/10.1109/CSCN.2017.8088617 I. Fzarris, J. B. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, B. Sahlin, Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems. 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki (2017), pp. 169–174. doi: https://​doi.​org/​10.​1109/​CSCN.​2017.​8088617
30.
go back to reference A. Molina Zarca, J.B. Bernabe, I. Farris, Y. Khettab, T. Taleb, A. Skarmeta, Enhancing IoT security through network softwarization and virtual security appliances. Int. J. Netw. Manag. 28(5), e2038 (2018)CrossRef A. Molina Zarca, J.B. Bernabe, I. Farris, Y. Khettab, T. Taleb, A. Skarmeta, Enhancing IoT security through network softwarization and virtual security appliances. Int. J. Netw. Manag. 28(5), e2038 (2018)CrossRef
Metadata
Title
Privacy and Security Threats on the Internet of Things
Authors
Sébastien Ziegler
Cédric Crettaz
Eunah Kim
Antonio Skarmeta
Jorge Bernal Bernabe
Ruben Trapero
Stefano Bianchi
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-04984-3_2