IoT Security Challenges and Ways Forward
Autor: | Marcel Medwed |
---|---|
Rok vydání: | 2016 |
Předmět: |
education.field_of_study
Cloud computing security Exploit business.industry Internet privacy Population 020206 networking & telecommunications Mindset 02 engineering and technology Computer security computer.software_genre Security information and event management Incentive 0202 electrical engineering electronic engineering information engineering Security through obscurity 020201 artificial intelligence & image processing business education computer Physical security |
Zdroj: | TrustED@CCS |
DOI: | 10.1145/2995289.2995298 |
Popis: | Today 2.9 billion people, or 40% of the world's population are online. By 2020, at least 40 billion more devices will become smart via embedded processors. The impact of such Internet of Things (IoT) on our society will be extraordinary. It will influence most consumer and business sectors, impact education, healthcare and safety. However, it certainly will also pose a challenge from a security point of view. Not only will the devices themselves become more complex, also the interaction between devices, the networks and the variance in topology will grow. Finally, with increasing amounts of data and assets at stake the incentive for attackers will increase. The costs of cyber attacks in such setting are estimated to reach about 2 trillion USD by 2020. Today, the IoT is just beginning to emerge. Unfortunately, when looking at its security, there is lots of room for improvement. Exploits reported at a steady pace clearly suggest that security is a major challenge when the world wants to successfully switch from an IoT hype to a real IoT deployment. Security, and security risk awareness, insufficiently present in today's consumer and developer mindset, are only a starting point. Once the requirement for strong security is widely accepted, there will be still the economical question of who is going to pay for security and its maintenance. Without enforcing certain standards by means of third party evaluation this problem is expected to be hard to get under control. |
Databáze: | OpenAIRE |
Externí odkaz: |