skip to main content
10.1145/2732209.2732216acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
invited-talk

IoT Security & Privacy: Threats and Challenges

Published: 14 April 2015 Publication History

Abstract

The era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent of IoT, most security threats were just related to information leakage and the loss of service. With IoT, security threats have become closely related to our non-virtual lives and they can directly influence physical security risk.
The Internet of Things consists of various platforms and devices with different capabilities, and each system will need security solutions depending on its characteristics. There is a demand for security solutions that are able to support multi-profile platforms and provide equivalent security levels for various device interactions. In addition, user privacy will become more important in the IoT environment because a lot of personal information will be delivered and shared among connected things. Therefore, we need mechanisms to protect personal data and monitor their flow from things to the cloud. In this talk, we describe threats and concerns for security and privacy arising from IoT services, and introduce approaches to solve these security and privacy issues in the industrial field.

Cited By

View all
  • (2024)Hybrid optimization based deep stacked autoencoder for routing and intrusion detectionWeb Intelligence10.3233/WEB-230109A(1-20)Online publication date: 25-Jul-2024
  • (2024)Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysisCybersecurity10.1186/s42400-024-00238-47:1Online publication date: 12-Jun-2024
  • (2024)Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and BehaviorProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642011(1-32)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. IoT Security & Privacy: Threats and Challenges

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security
    April 2015
    50 pages
    ISBN:9781450334495
    DOI:10.1145/2732209
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 April 2015

    Check for updates

    Author Tags

    1. data protection
    2. internet of things
    3. platform security
    4. privacy protection

    Qualifiers

    • Invited-talk

    Conference

    ASIA CCS '15
    Sponsor:
    ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security
    April 14 - March 14, 2015
    Singapore, Republic of Singapore

    Acceptance Rates

    IoTPTS '15 Paper Acceptance Rate 5 of 13 submissions, 38%;
    Overall Acceptance Rate 16 of 39 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)125
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 12 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Hybrid optimization based deep stacked autoencoder for routing and intrusion detectionWeb Intelligence10.3233/WEB-230109A(1-20)Online publication date: 25-Jul-2024
    • (2024)Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysisCybersecurity10.1186/s42400-024-00238-47:1Online publication date: 12-Jun-2024
    • (2024)Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and BehaviorProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642011(1-32)Online publication date: 11-May-2024
    • (2024)A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.331836911:5(7583-7603)Online publication date: 1-Mar-2024
    • (2024)Initial Seeds Generation Using LLM for IoT Device Fuzzing2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)10.1109/IOTSMS62296.2024.10710191(5-10)Online publication date: 2-Sep-2024
    • (2024)Navigating the Cyber Battlefield: Understanding Threats and Safeguarding Digital Frontiers2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)10.1109/ICEECT61758.2024.10739310(1-6)Online publication date: 29-Aug-2024
    • (2024)Feature selection for IoT botnet detection using equilibrium and Battle Royale OptimizationComputers & Security10.1016/j.cose.2024.104060147(104060)Online publication date: Dec-2024
    • (2024) Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks Concurrency and Computation: Practice and Experience10.1002/cpe.8283Online publication date: 3-Oct-2024
    • (2023)Framework of IoT, Blockchain, Digital Twins, and Artificial Intelligence Solutions in Support of the Digital Business Transformation of Logistics 5.0Supporting Technologies and the Impact of Blockchain on Organizations and Society10.4018/978-1-6684-5747-4.ch012(195-219)Online publication date: 19-May-2023
    • (2023)Cyber security threats in IoT: A reviewJournal of High Speed Networks10.3233/JHS-22204229:2(105-120)Online publication date: 21-Apr-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media