dc.contributor.author | Kavallieratos, Georgios | |
dc.contributor.author | Gkioulos, Vasileios | |
dc.contributor.author | Katsikas, Sokratis | |
dc.date.accessioned | 2019-11-27T07:30:23Z | |
dc.date.available | 2019-11-27T07:30:23Z | |
dc.date.created | 2019-08-26T08:21:20Z | |
dc.date.issued | 2019 | |
dc.identifier.isbn | 978-1-7281-0570-3 | |
dc.identifier.uri | http://hdl.handle.net/11250/2630641 | |
dc.description.abstract | The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These are further integrated within highly connected environments such as smart cities, smart homes, and smart cars, continuously adopting new technological developments. In this article, we focus on the smart home environment, as a case study for such ecosystems, where the integration of IoT devices increases the attack surface, evaluating whether existing risk assessment methods can be utilized for the identification and monitoring of risks, while also capturing the dynamic operational aspects. Accordingly, we review existing dynamic risk assessment methodologies and we leverage a smart home reference architecture to identify the security threats of a smart home's physical and communication viewpoints by leveraging the STRIDE methodology and Microsoft's threat modelling tool. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.relation.ispartof | Proceedings of the 15th Annual International Conference on Distributed Computing in Sensor Systems - DCOSS 2019 | |
dc.title | Threat Analysis in Dynamic Environments: The Case of the Smart Home | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 234-240 | nb_NO |
dc.identifier.doi | 10.1109/DCOSS.2019.00060 | |
dc.identifier.cristin | 1718553 | |
dc.description.localcode | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |