Safety, Security, and Privacy Threats Posed by Accelerating Trends in
the Internet of Things
- URL: http://arxiv.org/abs/2008.00017v1
- Date: Fri, 31 Jul 2020 18:04:20 GMT
- Title: Safety, Security, and Privacy Threats Posed by Accelerating Trends in
the Internet of Things
- Authors: Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth Mynatt, Klara
Nahrstedt, Shwetak Patel, Debra Richardson, and Ben Zorn
- Abstract summary: The Internet of Things (IoT) is already transforming industries, cities, and homes.
The economic value of this transformation across all industries is estimated to be trillions of dollars.
Alongside potential benefits of interconnected smart devices comes increased risk and potential for abuse.
- Score: 13.286330786426278
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Internet of Things (IoT) is already transforming industries, cities, and
homes. The economic value of this transformation across all industries is
estimated to be trillions of dollars and the societal impact on energy
efficiency, health, and productivity are enormous. Alongside potential benefits
of interconnected smart devices comes increased risk and potential for abuse
when embedding sensing and intelligence into every device. One of the core
problems with the increasing number of IoT devices is the increased complexity
that is required to operate them safely and securely. This increased complexity
creates new safety, security, privacy, and usability challenges far beyond the
difficult challenges individuals face just securing a single device. We
highlight some of the negative trends that smart devices and collections of
devices cause and we argue that issues related to security, physical safety,
privacy, and usability are tightly interconnected and solutions that address
all four simultaneously are needed. Tight safety and security standards for
individual devices based on existing technology are needed. Likewise research
that determines the best way for individuals to confidently manage collections
of devices must guide the future deployments of such systems.
Related papers
- Cross-Modality Safety Alignment [73.8765529028288]
We introduce a novel safety alignment challenge called Safe Inputs but Unsafe Output (SIUO) to evaluate cross-modality safety alignment.
To empirically investigate this problem, we developed the SIUO, a cross-modality benchmark encompassing 9 critical safety domains, such as self-harm, illegal activities, and privacy violations.
Our findings reveal substantial safety vulnerabilities in both closed- and open-source LVLMs, underscoring the inadequacy of current models to reliably interpret and respond to complex, real-world scenarios.
arXiv Detail & Related papers (2024-06-21T16:14:15Z) - Towards Guaranteed Safe AI: A Framework for Ensuring Robust and Reliable AI Systems [88.80306881112313]
We will introduce and define a family of approaches to AI safety, which we will refer to as guaranteed safe (GS) AI.
The core feature of these approaches is that they aim to produce AI systems which are equipped with high-assurance quantitative safety guarantees.
We outline a number of approaches for creating each of these three core components, describe the main technical challenges, and suggest a number of potential solutions to them.
arXiv Detail & Related papers (2024-05-10T17:38:32Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - IoT in the Cloud: Exploring Security Challenges and Mitigations for a Connected World [18.36339203254509]
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape.
IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.
IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers.
arXiv Detail & Related papers (2024-02-01T05:55:43Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Towards Evaluating the Security of Wearable Devices in the Internet of Medical Things [0.0]
The Internet of Medical Things (IoMT) offers a promising solution to improve patient health and reduce human error.
Wearable smart infusion pumps that accurately administer medication and integrate with electronic health records are an example of technology that can improve healthcare.
However, as the number of connected medical devices increases, the risk of cyber threats also increases.
arXiv Detail & Related papers (2023-12-13T14:12:52Z) - Learning, Computing, and Trustworthiness in Intelligent IoT
Environments: Performance-Energy Tradeoffs [62.91362897985057]
An Intelligent IoT Environment (iIoTe) is comprised of heterogeneous devices that can collaboratively execute semi-autonomous IoT applications.
This paper provides a state-of-the-art overview of these technologies and illustrates their functionality and performance, with special attention to the tradeoff among resources, latency, privacy and energy consumption.
arXiv Detail & Related papers (2021-10-04T19:41:42Z) - A Detail Study of Security and Privacy issues of Internet of Things [0.7874708385247353]
The Internet of Things refers to the billions of physical objects around the planet that are now connected to the Internet.
The main focus of this chapter is to systematically review the security and privacy of the Internet of Things in the present world.
arXiv Detail & Related papers (2020-09-14T11:58:22Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z) - Grand Challenges for Embedded Security Research in a Connected World [6.1916614285252]
The Computing Community Consortium (CCC) held a one-day visioning workshop to explore these issues.
Report synthesizes the results of that workshop and develops a list of strategic goals for research and education over the next 5-10 years.
arXiv Detail & Related papers (2020-05-13T21:01:57Z) - Internet of Things Security, Device Authentication and Access Control: A Review [1.6502857150914574]
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry.
In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly dependent on this technology for comfort and easy life style.
Security and privacy of this technology is foremost important issue to resolve.
arXiv Detail & Related papers (2019-01-09T02:01:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.