LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Arabo, A. (2015)
Publisher: Elsevier
Journal: Procedia Computer Science
Languages: English
Types: Article
Subjects:
Cybercrime and threats of cyber security is much closer to connected home ecosystems futures that ever been expected. Most of the research effort is focused on the defense mechanisms of cooperate and national infrastructures, not realizing that one of the weakest link in this systems comes from the devices used within connected smart homes of now and the future. The paper forms part of the research to analyze implications and challenges of cybersecurity to smart devices in smart connected homes. We present some related background and motivation seen on the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. The paper highlights the fact that while these devices provide more features and functionality, they also introduce new risks. Subsequently, current cybersecurity issues related to smart devices within connected homes discussed and analyzed.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Niemegeers, G. and S.M.d. Groot, From Personal Area Networks to Personal Networks: A User Oriented Approach. Wireless Personal Communications. 22(2): p. 175-186.
    • Webinos, Phase 1 - Architecture and Components. 2014.
    • al, J.L.e., Personal PKI for the smart device era. 9th European PKI Workshop: Research and Applications, 2012.
    • Juniper (2012) Trusted Mobility Index.
    • Reynolds, M., et al., The Gartner Scenario for Consumer Technology Providers (Gartner Analysis Report). 2012.
    • Cyber Security in the UK, in http://www.parliament.uk/pagefiles/10824/postpn389_cyber-security-in-the-UK.pdf, P. September, Editor.
    • 2011, Houses of Parliament.
    • Arabo, A. and B. Pranggono, Mobile Malware and Smart Device Security: Trends, Challenges and Solutions. 19th International Conference on Control Systems and Computer Science (CSCS), 2013: p. 526 - 531.
    • Juniper (2012) Juniper Networks 2011 Mobile Threats Report.
    • McAfee (2012) Variant of Mac Flashback Malware Making the Rounds.
    • Auriemma, L., Samsung devices with support for remote controllers. http://aluigi.org/adv/samsux_1-adv.txt, 26/04/2012.
    • Nunes, G.M., Sony Bravia Remote Denial of Service http://archives.neohapsis.com/archives/bugtraq/2012-04/0043.html, Apr 05 2012.
    • TrendMicro, Security in the Age of Mobility - Quarterly Security Roundup. http://www.trendmicro.com/cloud-content/us/pdfs/securityintelligence/reports/rpt_security_in_the_age_of_mobility.pdf, 2012.
    • Ashford, W., Nearly half of all web application cyber attacks target retailers, study shows. Computer Weekly, 2014.
    • Symantec, Iinternet Security Threat Report - 2011 Trends, P. Wood, Editor. 2012, Symantec.
    • Arabo, A. and B. Pranggono, Mobile Malware and Smart Device Security: Trends, Challenges and Solutions. 19th International Conference on Control Systems and Computer Science (CSCS), 2013 2013: p. 526 - 531.
    • Kessel, P.v. and K. Allan, Get ahead of cybercrime. EY's Global Information Security Survey 2014.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article