2018
DOI: 10.1007/978-3-319-70578-1_13
|View full text |Cite
|
Sign up to set email alerts
|

The Internet of Hackable Things

Abstract: Abstract. The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 9 publications
(6 reference statements)
0
22
0
Order By: Relevance
“…In such systems, it can be necessary to add external calculation and storage capabilities to the IoRT network, as robots, at the edge, may not be able to process and store huge volumes of data. The main cyber-security problems involve insecure communication among users and robots, authentication issues, sensitive data exposing, and weak default robot configuration [ 139 ].…”
Section: Issues and Challengesmentioning
confidence: 99%
“…In such systems, it can be necessary to add external calculation and storage capabilities to the IoRT network, as robots, at the edge, may not be able to process and store huge volumes of data. The main cyber-security problems involve insecure communication among users and robots, authentication issues, sensitive data exposing, and weak default robot configuration [ 139 ].…”
Section: Issues and Challengesmentioning
confidence: 99%
“…The proliferation of IoT devices on the market with little or no meaningful security associated with them [13], clearly shows the extent to which adequate security is not regarded as a high-priority for IoT device designers. Implementing a secure system from scratch not only requires a high degree of understanding of security principles and components; but also requires a significant additional effort over and above an insecure (or unsecured) configuration.…”
Section: B Perception That Security Is Hardmentioning
confidence: 99%
“…However, as for every technical result, some aspects of the IoT proved to be problematic. In particular, cybersecurity has been so far one of the biggest challenges for the IoT, as well as one of its most embarrassing failures [1].…”
Section: Introductionmentioning
confidence: 99%
“…Since the advent of IoT, the security research community has made an effort to raise awareness on the security challenges that the new paradigm brought. Some challenges, such as weak passwords or the lack of security updates, stem from best practices overlooked by manufacturers at the design phase [1]. Others, such as integration and automatic configuration, derive from the heterogeneous nature of the IoT itself [2].…”
Section: Introductionmentioning
confidence: 99%