M. Conti, G. D. Natale, Annelie Heuser, T. Pöppelmann, N. Mentens
{"title":"Do we need a holistic approach for the design of secure IoT systems?","authors":"M. Conti, G. D. Natale, Annelie Heuser, T. Pöppelmann, N. Mentens","doi":"10.1145/3075564.3079070","DOIUrl":null,"url":null,"abstract":"In this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In preparation to a panel discussion at the International Workshop on Malicious Software and Hardware in the Internet of Things (MalIoT), they indicate which aspects are important in the design of secured IoT systems, and to which extent we need a holistic approach that integrates security measures at all levels of design abstraction.","PeriodicalId":398898,"journal":{"name":"Proceedings of the Computing Frontiers Conference","volume":"150 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Computing Frontiers Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3075564.3079070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In preparation to a panel discussion at the International Workshop on Malicious Software and Hardware in the Internet of Things (MalIoT), they indicate which aspects are important in the design of secured IoT systems, and to which extent we need a holistic approach that integrates security measures at all levels of design abstraction.