2018
DOI: 10.1007/978-3-319-93375-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements and Tests for Smart Toys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Besides, the RPT must support LPS and non-PID collection by combining both long and short-range wireless communication protocols (e.g., NFC/RFID, Bluetooth). Note that by limiting PD collection does not minimize the need for adequate privacy policies and data security approaches [13,14]. In that way, all communication between the interface components must comply with data security models and universal standards.…”
Section: Page 1492mentioning
confidence: 99%
See 3 more Smart Citations
“…Besides, the RPT must support LPS and non-PID collection by combining both long and short-range wireless communication protocols (e.g., NFC/RFID, Bluetooth). Note that by limiting PD collection does not minimize the need for adequate privacy policies and data security approaches [13,14]. In that way, all communication between the interface components must comply with data security models and universal standards.…”
Section: Page 1492mentioning
confidence: 99%
“…Finally, to improve reliability and circumvent the identified vulnerabilities, we select the following data Security Requirement (SR) items for smart toys, which were proposed by de Carvalho and Eler [14].…”
Section: Technical Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…This section surveys and analyzes Data Flow Diagram (DFD), Privacy-Aware Data Flow Diagram (PA-DFD), and Privacy by Design (PbD) widely adopted preferred models use in the SCT design. For example, de Cavalho, and Eler [18] used high-level DFD to model data flow in order to identify privacy and security threats within the smart toy environment. To ascertain detail requirements of system development, DFDs are used to produce the process model [8].…”
Section: Data Flow Model and Petri-netsmentioning
confidence: 99%