2016
DOI: 10.1109/access.2016.2560919
|View full text |Cite
|
Sign up to set email alerts
|

Attitudes and Perceptions of IoT Security in Critical Societal Services

Abstract: A quiet revolution that impacts several sectors, ranging over transport, home automation, energy, industrial control, and health services is undergoing with addition of new networked devices leading to enhanced services. In this paper, we aim to identify information security requirements that are common over several (vertical) sectors, and in particular, ones that impact critical societal services, namely, the energy, water, and health management systems. We present the results of an interview-based study wher… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
51
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(51 citation statements)
references
References 22 publications
0
51
0
Order By: Relevance
“…With the prevalence of the Internet of Things (IoT), secure systems are expected to make the best use of the resources and devices in the environment as their availability and capabilities change in order to meet their requirements [2]. However, most existing solutions focus on the security threats associated with the IoT rather than the opportunities brought by the IoT to support security [44].…”
Section: Introductionmentioning
confidence: 99%
“…With the prevalence of the Internet of Things (IoT), secure systems are expected to make the best use of the resources and devices in the environment as their availability and capabilities change in order to meet their requirements [2]. However, most existing solutions focus on the security threats associated with the IoT rather than the opportunities brought by the IoT to support security [44].…”
Section: Introductionmentioning
confidence: 99%
“…The performance requirements of the system are also constantly increasing [2]. Especially in critical security areas, real-time performance and determinism are very important [3][4][5]. In terms of "real-time", real-time performance means that the control instruction can reach the control execution node at a specified time delay.…”
Section: Introductionmentioning
confidence: 99%
“…The Fiat-Chrysler hack of 2014 resulted in 1.4 million vehicle recalls when cybersecurity researchers discovered a wireless network interface vulnerability that a potential hacker could use to disable an Internet-connected Jeep Cherokee while driving [1] . Similarly, a 2015 reports discovered inadequate security in the ConnectedDrive functionality of BMW cars [1] .…”
Section: Security Threatsmentioning
confidence: 99%
“…The Fiat-Chrysler hack of 2014 resulted in 1.4 million vehicle recalls when cybersecurity researchers discovered a wireless network interface vulnerability that a potential hacker could use to disable an Internet-connected Jeep Cherokee while driving [1] . Similarly, a 2015 reports discovered inadequate security in the ConnectedDrive functionality of BMW cars [1] . The US Federal Drugs Administration (FDA) stopped an infusion pump in 2015 due to a security breach, because they discovered that the pumps could potentially be remotely accessed through a hospital's network, although they didn't find any cases of hackers hijacking the pumps [1] .…”
Section: Security Threatsmentioning
confidence: 99%
See 1 more Smart Citation