Cargando…

Security Requirements for the Internet of Things: A Systematic Approach

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known...

Descripción completa

Detalles Bibliográficos
Autores principales: Pal, Shantanu, Hitchens, Michael, Rabehaja, Tahiry, Mukhopadhyay, Subhas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7589427/
https://www.ncbi.nlm.nih.gov/pubmed/33086542
http://dx.doi.org/10.3390/s20205897
_version_ 1783600576612794368
author Pal, Shantanu
Hitchens, Michael
Rabehaja, Tahiry
Mukhopadhyay, Subhas
author_facet Pal, Shantanu
Hitchens, Michael
Rabehaja, Tahiry
Mukhopadhyay, Subhas
author_sort Pal, Shantanu
collection PubMed
description There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.
format Online
Article
Text
id pubmed-7589427
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75894272020-10-29 Security Requirements for the Internet of Things: A Systematic Approach Pal, Shantanu Hitchens, Michael Rabehaja, Tahiry Mukhopadhyay, Subhas Sensors (Basel) Article There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner. MDPI 2020-10-19 /pmc/articles/PMC7589427/ /pubmed/33086542 http://dx.doi.org/10.3390/s20205897 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Pal, Shantanu
Hitchens, Michael
Rabehaja, Tahiry
Mukhopadhyay, Subhas
Security Requirements for the Internet of Things: A Systematic Approach
title Security Requirements for the Internet of Things: A Systematic Approach
title_full Security Requirements for the Internet of Things: A Systematic Approach
title_fullStr Security Requirements for the Internet of Things: A Systematic Approach
title_full_unstemmed Security Requirements for the Internet of Things: A Systematic Approach
title_short Security Requirements for the Internet of Things: A Systematic Approach
title_sort security requirements for the internet of things: a systematic approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7589427/
https://www.ncbi.nlm.nih.gov/pubmed/33086542
http://dx.doi.org/10.3390/s20205897
work_keys_str_mv AT palshantanu securityrequirementsfortheinternetofthingsasystematicapproach
AT hitchensmichael securityrequirementsfortheinternetofthingsasystematicapproach
AT rabehajatahiry securityrequirementsfortheinternetofthingsasystematicapproach
AT mukhopadhyaysubhas securityrequirementsfortheinternetofthingsasystematicapproach