Pub Date : 2018-12-01DOI: 10.1109/miot.2018.8717593
J. S. Marcus
The Internet of Things (IoT) potentially offers society not only economic advantage but also gains in product quality and safety. At the same time, IoT (in conjunction with related technologies such as artificial intelligence and machine learning, to which we collectively refer as IoT/AI/ML) may open new potential product safety and liability exposures. What problems might be anticipated? Are potential exposures dealt with adequately by existing legal and policy measures, or do they call for some re-thinking of existing law and regulation? The European Union (EU) has adopted a common approach to two key groups of policy instruments in order to facilitate trade of goods and services throughout the EU: (1) product safety regulation, which establishes standards to which goods must conform; and (2) liability regulation, which enables consumers to recover their costs if they are harmed or injured due to a malfunctioning product (or potentially a defective service). Both are important, but our focus here is on liability.
{"title":"Liability: When Things Go Wrong in an Increasingly Interconnected and Autonomous World: A European View","authors":"J. S. Marcus","doi":"10.1109/miot.2018.8717593","DOIUrl":"https://doi.org/10.1109/miot.2018.8717593","url":null,"abstract":"The Internet of Things (IoT) potentially offers society not only economic advantage but also gains in product quality and safety. At the same time, IoT (in conjunction with related technologies such as artificial intelligence and machine learning, to which we collectively refer as IoT/AI/ML) may open new potential product safety and liability exposures. What problems might be anticipated? Are potential exposures dealt with adequately by existing legal and policy measures, or do they call for some re-thinking of existing law and regulation? The European Union (EU) has adopted a common approach to two key groups of policy instruments in order to facilitate trade of goods and services throughout the EU: (1) product safety regulation, which establishes standards to which goods must conform; and (2) liability regulation, which enables consumers to recover their costs if they are harmed or injured due to a malfunctioning product (or potentially a defective service). Both are important, but our focus here is on liability.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/MIOT.2018.8717600
R. Giaffreda, A. Biswas
{"title":"Fostering Iot Solutions For Sustainable Development In Africa","authors":"R. Giaffreda, A. Biswas","doi":"10.1109/MIOT.2018.8717600","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717600","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/miot.2018.8717594
M. Violette
{"title":"Standards Matters","authors":"M. Violette","doi":"10.1109/miot.2018.8717594","DOIUrl":"https://doi.org/10.1109/miot.2018.8717594","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/MIOT.2018.8717591
K. Gremban
{"title":"Technologies for IoT","authors":"K. Gremban","doi":"10.1109/MIOT.2018.8717591","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717591","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/MIOT.2018.8717595
Erin E. Kenneally
In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.
{"title":"The TTPs of Privacy and Security of the IoT","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8717595","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717595","url":null,"abstract":"In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/MIOT.2019.8950956
D. Sicker, D. Redl
Policymakers face a conundrum — promoting the adoption of IoT services to reap its many benefits, while safeguarding societal concerns. This will be a balancing act of oversight and regulation from policymakers to drive investment and consumer adoption while ensuring that safety, security, and privacy frameworks are in place. This column will explore critical national and international IoT policy and regulatory efforts as well as take a deeper dive into specific topics of interest.
{"title":"Policy and Regulatory Issues","authors":"D. Sicker, D. Redl","doi":"10.1109/MIOT.2019.8950956","DOIUrl":"https://doi.org/10.1109/MIOT.2019.8950956","url":null,"abstract":"Policymakers face a conundrum — promoting the adoption of IoT services to reap its many benefits, while safeguarding societal concerns. This will be a balancing act of oversight and regulation from policymakers to drive investment and consumer adoption while ensuring that safety, security, and privacy frameworks are in place. This column will explore critical national and international IoT policy and regulatory efforts as well as take a deeper dive into specific topics of interest.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"110 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/MIOT.2018.8552484
Erin E. Kenneally
This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.
{"title":"Privacy and Security","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8552484","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8552484","url":null,"abstract":"This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/miot.2018.8552483
M. Violette
{"title":"IoT Standards","authors":"M. Violette","doi":"10.1109/miot.2018.8552483","DOIUrl":"https://doi.org/10.1109/miot.2018.8552483","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116176379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/MIOT.2018.8552481
K. Gremban
{"title":"Editorial and Introduction to the Issue: Risk and Rewards of the Internet of Things","authors":"K. Gremban","doi":"10.1109/MIOT.2018.8552481","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8552481","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/IOTM.0001.2000162
Manos Papoutsakis, Konstantinos Fysarakis, G. Spanoudakis, S. Ioannidis
Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literature, with more recent approcahes focusing on the IoT. Nevertheless, oftentimes security and privacy aspects are not adequately considered, which constitutes a significant barrier to the deployment of IoT applications and services with security and privacy built-in by design. The objective of this work is to provide an overview of service composition approaches, highlighting how the scientific community approaches the IoT service composition problem, while identifying the limitations of the current solutions in terms of catering to the security and privacy challenges. Furthermore, a novel approach for composing IoT systems with proven security and privacy properties is proposed.
{"title":"Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis","authors":"Manos Papoutsakis, Konstantinos Fysarakis, G. Spanoudakis, S. Ioannidis","doi":"10.1109/IOTM.0001.2000162","DOIUrl":"https://doi.org/10.1109/IOTM.0001.2000162","url":null,"abstract":"Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literature, with more recent approcahes focusing on the IoT. Nevertheless, oftentimes security and privacy aspects are not adequately considered, which constitutes a significant barrier to the deployment of IoT applications and services with security and privacy built-in by design. The objective of this work is to provide an overview of service composition approaches, highlighting how the scientific community approaches the IoT service composition problem, while identifying the limitations of the current solutions in terms of catering to the security and privacy challenges. Furthermore, a novel approach for composing IoT systems with proven security and privacy properties is proposed.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116081354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}