Abstract
The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Cross site scripting (XSS) is an attack that injects malicious code into a Web application.
References
Press Releasem, Thirty-Four Percent Rise in IoT Development 22 June (2016), https://evansdata.com/press/viewRelease.php?pressID=237
Press Release, Gartner 10 Nov (2015), http://www.gartner.com/newsroom/id/3165317
J. Manyika et al., Unlocking the Potential of the Internet of Things (McKinsey & Company, 2015)
Press Release, Gartner 2 Feb (2016), http://www.gartner.com/newsroom/id/3198018
S. Poremba, The Internet of Things Has a Growing Number of Cybersecurity Problems, http://www.forbes.com/sites/sungardas/2015/01/29/the-internet-of-things-has-a-growing-number-of-cyber-security-problems
R. Roman, P. Najera, J. Lopez, Securing the Internet of Things. Computer 44(9), 51–58 Sept (2011)
Security Analysis of IoT Devices (HP report, 2015), http://fortifyprotect.com/HP_IoT_Research_Study.pdf
Secure Internet of Things Project (SITP), http://iot.stanford.edu/workshop14/SITP-8-11-14-Levis.pdf
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Heart of the IoT, Capgemini Consulting, Feb (2015), https://www.capgemini-consulting.com/resource-file-access/resource/pdf/iot_security_pov_10-1-15_v6_.pdf
D. Salikhov, K. Khanda, K. Gusmanov, M. Mazzara, N. Mavridis, Microservice-based IoT for smart buildings, in Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA ’17)
D. Salikhov, K. Khanda, K. Gusmanov, M. Mazzara, N. Mavridis, Jolie good buildings: internet of things for smart building infrastructure supporting concurrent apps utilizing distributed microservices, in Proceedings the First International Scientific Conference on Convergent Cognitive Information Technologies (Convergent 2016)
E. Ronen, C. O’Flynn, A. Shamir, A. Weingarten, IoT Goes Nuclear: Creating a ZigBee Chain Reaction (2016), http://iotworm.eyalro.net/iotworm.pdf
BeEF, The Browser Exploitation Framework, http://beefproject.com/
Consumer Alert: Consumer Affairs Warns Parents to Secure Video Baby Monitors, Jan (2016), http://www1.nyc.gov/site/dca/media/pr012716.page
Thermostat Ransomware: A Lesson in IoT Security, https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/
Keen Security Lab of Tencent, Car Hacking Research: Remote Attack Tesla Motors, http://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
R. Goyal, N. Dragoni, A. Spognardi, Mind the tracker you wear: a security analysis of wearable health trackers, in Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC ’16) (ACM, New York, NY, USA, 2016), pp. 131–136
M. Conti, N. Dragoni, S. Gottardo, MITHYS: Mind the hand you shake—protecting mobile devices from SSL usage vulnerabilities, in Security and Trust Management (Springer, New York, NY, USA, 2013)
M. Nalin, I. Baroni, M. Mazzara, A holistic infrastructure to support elderlies’ independent living, in Encyclopedia of E-Health and Telemedicine, ed. by M.M. Cruz-Cunha, I.M. Miranda, R. Martinho, R. Rijo (Chap. 46, IGI-Global), pp. 591–605
A.W. Mathews, Anthem: hacked database included 78.8 million people, Wall Street J. 24 Feb (2015), https://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364
K. Netkachova, R.E. Bloomfield, Security-informed safety. IEEE Computer 49(6), 98–102 June (2016)
M. Mazzara, L. Biselli, P.P. Greco, N. Dragoni, A. Marraffa, N. Qamar, S. de Nicola, Social networks and collective intelligence: a return to the agora, in Social Network Engineering for Secure Web Data and Services, ed. by L. Caviglione, M. Coccoli, A. Merlo (IGI-Global, 2013)
M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi, Analysis of DDoS-capable IoT malwares, in Proceedings of 1st International Conference on Security, Privacy, and Trust (INSERT) (IEEE, 2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Dragoni, N., Giaretta, A., Mazzara, M. (2018). The Internet of Hackable Things. In: Ciancarini, P., Litvinov, S., Messina, A., Sillitti, A., Succi, G. (eds) Proceedings of 5th International Conference in Software Engineering for Defence Applications. SEDA 2016. Advances in Intelligent Systems and Computing, vol 717. Springer, Cham. https://doi.org/10.1007/978-3-319-70578-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-70578-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70577-4
Online ISBN: 978-3-319-70578-1
eBook Packages: EngineeringEngineering (R0)