6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Security Requirements for the Internet of Things: A Systematic Approach

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.

          Related collections

          Most cited references169

          • Record: found
          • Abstract: not found
          • Article: not found

          Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The Internet of Things: A survey

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Internet of Things (IoT): A vision, architectural elements, and future directions

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                19 October 2020
                October 2020
                : 20
                : 20
                : 5897
                Affiliations
                [1 ]Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia; shantanu.pal@ 123456hdr.mq.edu.au (S.P.); michael.hitchens@ 123456mq.edu.au (M.H.)
                [2 ]Macquarie University Cyber Security Hub, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia; tahiry.rabehaja@ 123456mq.edu.au
                [3 ]School of Engineering, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia
                Author notes
                [* ]Correspondence: subhas.mukhopadhyay@ 123456mq.edu.au ; Tel.: +61-2-9850-6510
                Author information
                https://orcid.org/0000-0002-8784-0154
                https://orcid.org/0000-0001-6320-9184
                https://orcid.org/0000-0002-3630-4749
                https://orcid.org/0000-0002-8600-5907
                Article
                sensors-20-05897
                10.3390/s20205897
                7589427
                33086542
                1d02a01e-bf0f-458f-9838-d41610c047d6
                © 2020 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 28 September 2020
                : 15 October 2020
                Categories
                Article

                Biomedical engineering
                internet of things,access control,threats and attacks,security requirements

                Comments

                Comment on this article