The University of Southampton
University of Southampton Institutional Repository

Building on a secure foundation for the Internet of Things

Building on a secure foundation for the Internet of Things
Building on a secure foundation for the Internet of Things
The Internet of Things (IoT) is growing in different ways. The adoption rate of the IoT is at least five times faster than the adoption of electricity and telephony. Moreover, it is becoming the backbone of the future of the Internet that encompass various applications and devices. The IoT faces many challenges that stand as a barrier for the successful deployment. The security is considered the most difficult challenge that need to be addressed. Our work was instructed by the Internet of Things Security Foundation (IoTSF) in order to guide the future focus for the steering group to identify which areas of the IoT security to prioritize its efforts. The IoTSF has a mission to address the security needs of the IoT in order to ensure that its adoption can meet its predicted aspirations for establishing the business value. An initial focus on providing advice and best practice to hinder repeats of the mayhem enabled by the Mirai infection of consumer remote cameras and mainstream consumer vehicles, that is working towards building consensus for an internationally “approved by” mark that consumers can look for to determine security. This is addressing the need for trusted boot, root of trust, signed binary images and encrypted communication channels to secure the remote device.
This paper suggests that the next area for consideration for The IoTSF is a co-operative security, a means of building trust into a group such that a collection of data sources that provide different telemetry data that are used in analytics to formulate an action are of known, secure origin.
1-15
Ashok, Ranchhod
2b7b555b-5811-4bf1-8168-d648b0801d86
Zinopoulou, M.
6c292328-a848-47dd-ae43-9fda0bab4a43
Atlam, Hany, F.
addb33f5-5f65-4523-a6b8-328d9677c5d2
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
Zulkipli NH, Nik
ef6397df-0971-4843-8004-c7a5fc7cbda5
Ashok, Ranchhod
2b7b555b-5811-4bf1-8168-d648b0801d86
Zinopoulou, M.
6c292328-a848-47dd-ae43-9fda0bab4a43
Atlam, Hany, F.
addb33f5-5f65-4523-a6b8-328d9677c5d2
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
Zulkipli NH, Nik
ef6397df-0971-4843-8004-c7a5fc7cbda5

Ashok, Ranchhod, Zinopoulou, M., Atlam, Hany, F., Wills, Gary and Zulkipli NH, Nik (2016) Building on a secure foundation for the Internet of Things. In IoT Security Foundation Conference 2016. pp. 1-15 .

Record type: Conference or Workshop Item (Paper)

Abstract

The Internet of Things (IoT) is growing in different ways. The adoption rate of the IoT is at least five times faster than the adoption of electricity and telephony. Moreover, it is becoming the backbone of the future of the Internet that encompass various applications and devices. The IoT faces many challenges that stand as a barrier for the successful deployment. The security is considered the most difficult challenge that need to be addressed. Our work was instructed by the Internet of Things Security Foundation (IoTSF) in order to guide the future focus for the steering group to identify which areas of the IoT security to prioritize its efforts. The IoTSF has a mission to address the security needs of the IoT in order to ensure that its adoption can meet its predicted aspirations for establishing the business value. An initial focus on providing advice and best practice to hinder repeats of the mayhem enabled by the Mirai infection of consumer remote cameras and mainstream consumer vehicles, that is working towards building consensus for an internationally “approved by” mark that consumers can look for to determine security. This is addressing the need for trusted boot, root of trust, signed binary images and encrypted communication channels to secure the remote device.
This paper suggests that the next area for consideration for The IoTSF is a co-operative security, a means of building trust into a group such that a collection of data sources that provide different telemetry data that are used in analytics to formulate an action are of known, secure origin.

Text
paper Marialena - Author's Original
Download (730kB)

More information

Published date: 1 December 2016

Identifiers

Local EPrints ID: 417540
URI: http://eprints.soton.ac.uk/id/eprint/417540
PURE UUID: afde30be-9bfe-4391-b077-b58b65535762
ORCID for Hany, F. Atlam: ORCID iD orcid.org/0000-0003-4142-6377
ORCID for Gary Wills: ORCID iD orcid.org/0000-0001-5771-4088

Catalogue record

Date deposited: 02 Feb 2018 17:30
Last modified: 16 Mar 2024 02:52

Export record

Contributors

Author: Ranchhod Ashok
Author: M. Zinopoulou
Author: Hany, F. Atlam ORCID iD
Author: Gary Wills ORCID iD
Author: Nik Zulkipli NH

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×