Security Risks in the Internet of Things

With the development and promotion of technologies of the Internet of Things, we cannot ignore the security implications because signal loss will directly affect the whole security of the Internet of Things. Since hackers, malicious software and viruses s

  • PDF / 56,997 Bytes
  • 6 Pages / 439.37 x 666.142 pts Page_size
  • 101 Downloads / 225 Views

DOWNLOAD

REPORT


Security Risks in the Internet of Things Xueping Liu

Abstract With the development and promotion of technologies of the Internet of Things, we cannot ignore the security implications because signal loss will directly affect the whole security of the Internet of Things. Since hackers, malicious software and viruses such as Trojan horses are prevalent, our travel may be restricted and our communication may be disturbed. This paper describes the Internet of Things and focuses on several security risks in the Internet of Things. Keywords Security • Internet of things • IoT • RFID

8.1

Introduction

In the last few years, a stimulating idea is fast emerging in the wireless scenario: the pervasive presence around us of a variety of “things” or “objects”, such as RFID, sensors, and actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighbouring “smart” components to reach common goals. In the Internet of Things (IoT), everything real becomes virtual, which means that each person and thing has a locatable, addressable, and readable counterpart on the Internet. These virtual entities can produce and consume services and collaborate toward a common goal. The user’s phone knows about his physical and mental state through a network of devices that surround his body, so it can act on his behalf. The embedded system in a swimming pool can share its state with other virtual entities. With these characteristics, the IoT promises to extend “anywhere, anyhow, anytime” computing to “anything, anyone, any service [2].”

X. Liu (*) College of Foreign Language, Chongqing University of Posts and Telecommunications, Chongqing, China e-mail: [email protected] S. Zhong (ed.), Proceedings of the 2012 International Conference on Cybernetics and Informatics, Lecture Notes in Electrical Engineering 163, DOI 10.1007/978-1-4614-3872-4_8, # Springer Science+Business Media New York 2013

59

60

X. Liu

Actually, many challenging issues still need to be addressed and both technological and social nodes untied before the IoT idea being widely accepted. Central issues are making a full interoperability of such devices possible, enabling their adaptation and autonomous behavior, as well as guaranteeing trust, privacy, and security. Also, the IoT idea poses several new problems concerning the networking aspects. In fact, the “things” composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to pay special attention to resource efficiency besides the obvious scalability problems [1]. In the IoT vision, every physical object has a virtual component that can produce and consume services. Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its privacy and security [2]. In this article, we want to focus on the security risks in the IoT. The rest of the paper is organized as follows: Sect. 8.2 introduces the Int