The era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent of IoT, most security threats were just related to information leakage and the loss of service. With IoT, security threats have become closely related to our nonvirtual lives and they can directly influence physical security risk.The Internet of Things consists of various platforms and devices with different capabilities, and each system will need security solutions depending on its characteristics. There is a demand for security solutions that are able to support multi-profile platforms and provide equivalent security levels for various device interactions. In addition, user privacy will become more important in the IoT environment because a lot of personal information will be delivered and shared among connected things. Therefore, we need mechanisms to protect personal data and monitor their flow from things to the cloud. In this talk, we describe threats and concerns for security and privacy arising from IoT services, and introduce approaches to solve these security and privacy issues in the industrial field.
SECURITY THREATS IN IOTFor the Internet of Things (IoT) services, there are numerous types of things from light to rich devices; the communication between things occurs through various networks . It means that there are security risks in each device/network layer and the user privacy can be exposed from diverse routes. Therefore, all kinds of attack scenarios in the previous IT environment should be re-considered more seriously.
SECURITY THREATS IN IOTWe introduce the concerns and the high-level approaches to provide secure IoT environment.
Secure Things OrchestrationThings in IoT are organically operated by connecting with other things, and the connected things are dynamically changed. In such a situation, the connected things should be able to keep the required security level. For instance, local devices and sensors used in home should communicate securely with each other, and should be securely managed to support multi-things orchestration. In addition, when they communicate with external thing, all things should be operated under the same security policy.
Abstract. We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio [9]. Our scheme reduces the length of enabling block of the DF scheme by (about) half. Additionally, the computational overhead of the user is lower than that of the DF scheme; instead, the computational overhead of the server is increased. The total computational overhead of the user and the server is the same as that of the DF scheme, and therefore, our scheme is more practical, since the computing power of the user is weaker than that of the server in many applications. In addition, our scheme is secure against adaptive chosen ciphertext attack under only the decision Diffie-Hellman (DDH) assumption and the collision-resistant hash function H assumption, whereas the DF scheme also needs the one-time MAC (message authentication code) assumption.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.