2017
DOI: 10.31224/osf.io/5ua7g
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Internet of Hackable Things

Abstract: The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
2

Relationship

6
2

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Second, process reconfiguration [29], which especially applies to multi-robot systems as described in the related section of this work. Third, although security has been discussed in this and previous papers [22], [30], the open challenges are far from being solved here.…”
Section: Discussionmentioning
confidence: 91%
See 1 more Smart Citation
“…Second, process reconfiguration [29], which especially applies to multi-robot systems as described in the related section of this work. Third, although security has been discussed in this and previous papers [22], [30], the open challenges are far from being solved here.…”
Section: Discussionmentioning
confidence: 91%
“…The problem of cybersecurity in robotics is outlined in [22], which discusses existing bugs and vulnerabilities that admit robots to be hacked remotely, applications that require security and privacy to be implemented in the field of robotics. Cybersecurity is also relevant for robots and automation systems that rely on data and software code from the network to maintain their functionality.…”
Section: Securitymentioning
confidence: 99%
“…In the future, we aim to implement the system to have a more in-depth insight into the performance and security issues that can emerge when computing has an high level of pervasiveness [6]. Moreover, we also aim to develop the Inno-EAV system to work on a larger scale.…”
Section: Discussionmentioning
confidence: 99%
“…Given the experiences with automotive or other devices, building owner may be aware of it [? ], [20]. The problem has to be addressed from two different point of view: technical and communication.…”
Section: Crosscutting Concernsmentioning
confidence: 99%