Next Article in Journal
Sensors Made of Natural Renewable Materials: Efficiency, Recyclability or Biodegradability—The Green Electronics
Previous Article in Journal
egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network
Previous Article in Special Issue
Recognizing Non-Collaborative Radio Station Communication Behaviors Using an Ameliorated LeNet
Open AccessArticle

Security Requirements for the Internet of Things: A Systematic Approach

1
Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia
2
Macquarie University Cyber Security Hub, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia
3
School of Engineering, Faculty of Science and Engineering, Macquarie University, Sydney, NSW 2109, Australia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(20), 5897; https://doi.org/10.3390/s20205897
Received: 28 September 2020 / Revised: 13 October 2020 / Accepted: 15 October 2020 / Published: 19 October 2020
(This article belongs to the Special Issue Signal Processing Techniques for Smart Sensor Communications)
There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner. View Full-Text
Keywords: Internet of Things; access control; threats and attacks; security requirements Internet of Things; access control; threats and attacks; security requirements
Show Figures

Figure 1

MDPI and ACS Style

Pal, S.; Hitchens, M.; Rabehaja, T.; Mukhopadhyay, S. Security Requirements for the Internet of Things: A Systematic Approach. Sensors 2020, 20, 5897.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop