To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The Internet of Hackable Things
Örebro University, School of Science and Technology. DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark. (Centre for Applied Autonomous Sensor Systems)ORCID iD: 0000-0001-9575-2990
Örebro University, School of Science and Technology. (Centre for Applied Autonomous Sensor Systems)ORCID iD: 0000-0001-9293-7711
Innopolis University, Innopolis, Russian Federation.ORCID iD: 0000-0002-3860-4948
2018 (English)In: Proceedings of 5th International Conference in Software Engineering for Defence Applications: SEDA 2016 / [ed] Ciancarini, P.; Litvinov, S.; Messina, A.; Sillitti, A.; Succi, G., Cham: Springer, 2018, p. 129-140Conference paper, Published paper (Refereed)
Abstract [en]

The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

Place, publisher, year, edition, pages
Cham: Springer, 2018. p. 129-140
Series
Advances in Intelligent Systems and Computing (AISC), ISSN 2194-5357, E-ISSN 2194-5365 ; 717
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:oru:diva-64664DOI: 10.1007/978-3-319-70578-1_13ISI: 000434086000013Scopus ID: 2-s2.0-85041846777ISBN: 978-3-319-70577-4 (print)ISBN: 978-3-319-70578-1 (electronic)OAI: oai:DiVA.org:oru-64664DiVA, id: diva2:1178770
Conference
5th International Conference in Software Engineering for Defence Applications, Rome, Italy, May 10, 2016
Available from: 2018-01-30 Created: 2018-01-30 Last updated: 2021-01-07Bibliographically approved
In thesis
1. Securing the Internet of Things with Security-by-Contract
Open this publication in new window or tab >>Securing the Internet of Things with Security-by-Contract
2021 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Smart homes, industry, healthcare, robotics; virtually every market has seen the uprising of Internet of Things (IoT) devices with different degrees and nuances. IoT devices embody different desirable characteristics, such as mobility, ubiquity, variety, and affordability. All combined, these features made so that IoT devices reached 35 billion units in the world. However, the sudden uprising of market demand put enormous pressure on manufacturers. The necessity of delivering to customers as many devices as possible, in the shortest time possible, leads manufacturers to overlook features that are not perceived critical by the users, such as resiliency to cyberattacks. This led to severe security issues. The prime example is Mirai, a malware that infected hundreds of thousands of IoT devices in 2016 and used them to strike lethal Distributed Denial of Service (DDoS) attacks.

In the first part of this thesis, we present the state of the art regarding IoT devices security resilience. In particular, we provide relevant examples of breaches, an analysis of the relationship between IoT and Cloud from a security point of view, and an example of an IoT device penetration test. Then, we focus on the usage of IoT devices in DDoS-enabled botnets and we provide an extensive study of DDoS-enabling malwares, discussing their evolution and their capabilities.

In the second part, we contextualise the gathered knowledge and we show that the highlighted problems stem from two main causes: insecure configurations and insufficient secure configurability.We also show that, to address these two issues, it is necessary to equip IoT devices with precise and formal descriptions of their behaviour. Therefore, we propose SC4IoT, a security framework for IoT devices that combines Security-by-Contract (SC) paradigm and Fog Computing paradigm. First, we provide a thorough breakdown of our proposal. We start from high-level lifecycles that describe how devices participate to SC4IoT. Then, we discuss the pillars that compose the framework (e.g., security contracts and security policies), together with their formal descriptions. Last, we provide precise algorithms for achieving security-policy matching capabilities, as well as routines for allowing the framework to deal with dynamic changes while maintaining consistency.

Place, publisher, year, edition, pages
Örebro: Örebro University, 2021. p. 55
Series
Örebro Studies in Technology, ISSN 1650-8580 ; 90
National Category
Computer Sciences
Identifiers
urn:nbn:se:oru:diva-88151 (URN)978-91-7529-364-6 (ISBN)
Public defence
2021-01-29, Örebro universitet, Långhuset, Hörsal L2 (and online (zoom)), Fakultetsgatan 1, Örebro, 13:00 (English)
Opponent
Supervisors
Available from: 2020-12-18 Created: 2020-12-18 Last updated: 2021-01-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Dragoni, NicolaGiaretta, Alberto

Search in DiVA

By author/editor
Dragoni, NicolaGiaretta, AlbertoMazzara, Manuel
By organisation
School of Science and Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 325 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf