Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Guiding Framework for Vetting the Internet of Things
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Alkharj, 11942, Saudi Arabia.
College of Technological Innovation, Zayed University, Dubai, UAE.
Samovar, Télécom SudParis, Institut Polytechnique de Paris, Paris, France.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Qena 83513, Egypt. Centre for Security, Communications and Network Research, University of Plymouth, Plymouth PL4 8AA, UK.ORCID iD: 0000-0002-3800-0757
Show others and affiliations
2020 (English)In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 55, article id 102644Article in journal (Refereed) Published
Abstract [en]

Like any emerging and disruptive technology, multiple obstacles are slowing down the Internet of Things (IoT) expansion for instance, multiplicity of things’ standards, users’ reluctance and sometimes rejection due to privacy invasion, and limited IoT platform interoperability. IoT expansion is also accompanied by the widespread use of mobile apps supporting anywhere, anytime service provisioning to users. By analogy to vetting mobile apps, this paper addresses the lack of principles and techniques for vetting IoT devices (things) in preparation for their integration into mission-critical systems. Things have got vulnerabilities that should be discovered and assessed through proper device vetting. Unfortunately, this is not happening. Rather than sensing a nuclear turbines steam level, a thing could collect some sensitive data about the turbine without the knowledge of users and leak these data to third parties. This paper presents a guiding framework that defines the concepts of, principles of, and techniques for thing vetting as a pro-active response to potential things vulnerabilities.

Place, publisher, year, edition, pages
Elsevier, 2020. Vol. 55, article id 102644
Keywords [en]
Internet of Things, Security vulnerabilities, Vetting, Atomic/composite duties
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
URN: urn:nbn:se:ltu:diva-81245DOI: 10.1016/j.jisa.2020.102644ISI: 000601365800005Scopus ID: 2-s2.0-85092894253OAI: oai:DiVA.org:ltu-81245DiVA, id: diva2:1479403
Note

Validerad;2020;Nivå 2;2020-10-27 (alebob)

Available from: 2020-10-27 Created: 2020-10-27 Last updated: 2021-01-14Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Awad, Ali Ismail

Search in DiVA

By author/editor
Awad, Ali Ismail
By organisation
Digital Services and Systems
In the same journal
Journal of Information Security and Applications
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 112 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf