Watch and share our freshly published video by our partner MobileThinking SARL from the testing phase of the very first on-demand, door-to-door test scenario of autonomous vehicles of the Avenue Project at Belle-idée Pilot Site in Geneva, Switzerland operated by TPG Public Transport of Geneva. We are all excited and proud for this innovative piloting phase!
Abstract: The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas
Date: 10 June 2019, DOI: 10.3390/sym11060774
Download: Publisher’s version (Gold Open Access)
Demonstrator & Replicator sites
SUBSCRIBTIONS ARE NOW CLOSED
Prof. Dimitri KONSTANTAS
Information Science Institute – Director
AVENUE projet Coordinator
Uni Battelle – Office 236
University Of Geneva
Route de Drize 7
This project has received funding from the European Union’s Horizon 2020 Research and Innovation Programme under grant agreement no 769033.