In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT). We claim that the usual approach to security issues, typical of more classical systems and networks, does not grab all the aspects related to this new paradigm of communication, sharing and actuation. In fact, the IoT paradigm involves new features, mechanisms and dangers that cannot be completely taken into consideration through the classical formulation of security problems. The IoT calls for a new paradigm of security, which will have to consider the security problem from a holistic perspective including the new actors and their interactions. In this paper, we propose a systemic approach to security in IoT and explore the role of each actor and its interactions with the other main actors of the proposed scheme. © 2013 IEEE.

A systemic approach for IoT security

Natalizio E.;
2013-01-01

Abstract

In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT). We claim that the usual approach to security issues, typical of more classical systems and networks, does not grab all the aspects related to this new paradigm of communication, sharing and actuation. In fact, the IoT paradigm involves new features, mechanisms and dangers that cannot be completely taken into consideration through the classical formulation of security problems. The IoT calls for a new paradigm of security, which will have to consider the security problem from a holistic perspective including the new actors and their interactions. In this paper, we propose a systemic approach to security in IoT and explore the role of each actor and its interactions with the other main actors of the proposed scheme. © 2013 IEEE.
2013
Internet of Things
Security
Systemic Approach
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11770/384866
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 139
  • ???jsp.display-item.citation.isi??? ND
social impact