An Analysis of Malicious Threat Agents for the Smart Connected Home [Elektronisk resurs]
-
Bugeja, Joseph (författare)
-
IEEE International Conference on Pervasive Computing and Communication (PerCom) 2017 - the First International Workshop on Pervasive Smart Living Spaces (PerLS 2017), Kona, Big Island, Hawaii, USA (March 13–17, 2017)
-
Jacobsson, Andreas (författare)
-
Davidsson, Paul (författare)
-
Malmö högskola Fakulteten för teknik och samhälle (TS) (utgivare)
-
Malmö högskola Internet of Things and People (IOTAP) (utgivare)
- Publicerad: IEEE, 2017
- Engelska.
-
Ingår i: Proceeding of 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
-
Läs hela texten
-
Läs hela texten
-
Läs hela texten
-
Läs hela texten
Sammanfattning
Ämnesord
Stäng
- Smart connected home systems aim to enhance the comfort, convenience, security, entertainment, and health of the householders and their guests. Despite their advantages, their interconnected characteristics make smart home devices and services prone to various cybersecurity and privacy threats. In this paper, we analyze six classes of malicious threat agents for smart connected homes. We also identify four different motives and three distinct capability levels that can be used to group the different intruders. Based on this, we propose a new threat model that can be used for threat profiling. Both hypothetical and real-life examples of attacks are used throughout the paper. In reflecting on this work, we also observe motivations and agents that are not covered in standard agent taxonomies.
Ämnesord
- Engineering and Technology (hsv)
- Teknik och teknologier (hsv)
Genre
- government publication (marcgt)
Indexterm och SAB-rubrik
- Smart homes
- Privacy
- Terrorism
- Computer security
- Taxonomy
- Home appliances
- connected home
- IoT
- threat agent
- threat agent motivations
- threat agent capabilities
Inställningar
Hjälp
Uppgift om bibliotek saknas i LIBRIS
Kontakta ditt bibliotek, eller sök utanför LIBRIS. Se högermenyn.