Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many different technical and scientific areas, among them Security. In this sense, security becomes an extremely complex problem as it is present in every aspect of the IoT ecosystem, from sensors and data acquisition hardware to front-end software applications and sophisticated user devices. This complexity expands as there is not consensus among all stakeholders towards the definition of general technical standards, specifications, system representations and use policies. In this context, this paper presents a state of intention for a research project oriented to construct a set of tools to characterize security attack surfaces for IoT systems solutions. The proposed research includes the development of a visual grammar aimed to depict IoT systems at a high-Abstraction level together with the construction of objects profiles, which in conjunction will provide building blocks and mechanisms to evaluate or identify insecure IoT scenarios.

Original languageEnglish
Title of host publication2016 8th IEEE Latin-American Conference on Communications, LATINCOM 2016
EditorsCarlos E. Velasquez-Villada
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509051373
DOIs
StatePublished - 2016
Event8th IEEE Latin-American Conference on Communications, LATINCOM 2016 - Medellin, Colombia
Duration: 15 Nov 201617 Nov 2016

Publication series

Name2016 8th IEEE Latin-American Conference on Communications, LATINCOM 2016

Conference

Conference8th IEEE Latin-American Conference on Communications, LATINCOM 2016
Country/TerritoryColombia
CityMedellin
Period15/11/1617/11/16

Keywords

  • Computer Security
  • Computer aided analysis
  • Data Processing
  • Internet of things
  • Mobile applications

Fingerprint

Dive into the research topics of 'Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation'. Together they form a unique fingerprint.

Cite this