Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation

Producción científica: Capítulo del libro/informe/acta de congresoContribución a la conferenciarevisión exhaustiva

6 Citas (Scopus)

Resumen

The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many different technical and scientific areas, among them Security. In this sense, security becomes an extremely complex problem as it is present in every aspect of the IoT ecosystem, from sensors and data acquisition hardware to front-end software applications and sophisticated user devices. This complexity expands as there is not consensus among all stakeholders towards the definition of general technical standards, specifications, system representations and use policies. In this context, this paper presents a state of intention for a research project oriented to construct a set of tools to characterize security attack surfaces for IoT systems solutions. The proposed research includes the development of a visual grammar aimed to depict IoT systems at a high-Abstraction level together with the construction of objects profiles, which in conjunction will provide building blocks and mechanisms to evaluate or identify insecure IoT scenarios.

Idioma originalInglés
Título de la publicación alojada2016 8th IEEE Latin-American Conference on Communications, LATINCOM 2016
EditoresCarlos E. Velasquez-Villada
EditorialInstitute of Electrical and Electronics Engineers Inc.
ISBN (versión digital)9781509051373
DOI
EstadoPublicada - 2016
Evento8th IEEE Latin-American Conference on Communications, LATINCOM 2016 - Medellin, Colombia
Duración: 15 nov. 201617 nov. 2016

Serie de la publicación

Nombre2016 8th IEEE Latin-American Conference on Communications, LATINCOM 2016

Conferencia

Conferencia8th IEEE Latin-American Conference on Communications, LATINCOM 2016
País/TerritorioColombia
CiudadMedellin
Período15/11/1617/11/16

Huella

Profundice en los temas de investigación de 'Towards IoT cybersecurity modeling: From malware analysis data to IoT system representation'. En conjunto forman una huella única.

Citar esto