Title | The Internet of Things: a domain-specific security requirement classification |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Mukalazi, Arafat, Boyaci, Ali |
Conference Name | 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) |
Date Published | jun |
Keywords | Architecture, automobiles, human computer interaction, Internet of Things, Internet of Things(IoT), Optimization, pubcrawl, robots, Scalability, Scalable Security, security, security requirement classification, threats and attacks, wearable computers |
Abstract | Worldwide, societies are rapidly becoming more connected, owing primarily to the growing number of intelligent things and smart applications (e.g, smart automobiles, smart wearable devices, etc.) These have occurred in tandem with the Internet Of Things, a new method of connecting the physical and virtual worlds. It is a new promising paradigm whereby every 'thing' can connect to anything via the Internet. However, with IoT systems being deployed even on large-scale, security concerns arise amongst other challenges. Hence the need to allocate appropriate protection of resources. The realization of secure IoT systems could only be accomplished with a comprehensive understanding of the particular needs of a specific system. How-ever, this paradigm lacks a proper and exhaustive classification of security requirements. This paper presents an approach towards understanding and classifying the security requirements of IoT devices. This effort is expected to play a role in designing cost-efficient and purposefully secured future IoT systems. During the coming up with and the classification of the requirements, We present a variety of set-ups and define possible attacks and threats within the scope of IoT. Considering the nature of IoT and security weaknesses as manifestations of unrealized security requirements, We put together possible attacks and threats in categories, assessed the existent IoT security requirements as seen in literature, added more in accordance with the applied domain of the IoT and then classified the security requirements. An IoT system can be secure, scalable, and flexible by following the proposed security requirement classification. |
DOI | 10.1109/HORA55278.2022.9800035 |
Citation Key | mukalazi_internet_2022 |