Selected Articles from IEEE Xplore - September 2016

Introduction by Jianqing Zhang, VMware Inc.

The Internet of Things (IoT) connects everyone with everything anywhere and at anytime. It fills the gap between the physical world and the cyber world, and will significantly change people's lives. At the same time, IoT applications have to address the same security problems in the cyber world with new challenges which are brought on by IoT itself. A common pitfall in IoT security practices is to “naively” leverage classic security mechanisms without systematic analysis or evaluation. Such methodology usually fails to address the system constraints, real-time requirements, practical economic models, etc. in IoT applications. Therefore, it cannot achieve the goal of protecting IoT assets. On the other hand, being an ecosystem, IoT does not stand alone. For example, smart phones, the de facto hub or gateway of IoT devices, play a key role in connecting smart devices. Smart phone apps form a platform and ecosystem of IoT applications like the Smart Home. Mobile computing, or smart phone technology, is one of the pillars of IoT in most cases. The study and analysis of security of the ecosystems will present us with an opportunity to re-visit our mindset or paradigm of IoT security. In general, although security may not turn out to be a real obstacle in the adoption of IoT, it will have wider and deeper impact on us because it will be immersed into our lives. We need consider IoT security problems from a perspective of IoT.

 

IEEE Xplore References

  1. R. Roman, P. Najera and J. Lopez, "Securing the Internet of Things," in Computer, vol. 44, no. 9, pp. 51-58, Sept. 2011.
  2. M. Zhao, J. Walker and C. C. Wang, "Challenges and Opportunities for Securing Intelligent Transportation System," in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp. 96-105, March 2013.
  3. E. Fernandes, J. Jung and A. Prakash, "Security Analysis of Emerging Smart Home Applications," 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 636-654.

 

Subscribe to the IEEE Internet of Things Technical Community to receive complimentary access to our selected articles each month via email.

 

View more Selected Articles from IEEE Xplore