Two Perspectives on IoT Security: Standards and Runtime Enforcement
Carnegie Mellon University Software Engineering Institute Pittsburgh United States
Pagination or Media Count:
Internet of Things IoT devices are increasingly being used to support operations in tactical environments, such as those experienced by first responders, military, medics, and other field personnel. In addition to disconnected, intermittent, and limited DIL network connectivity, threats in these environments often include sabotage, capture, and impersonation, of both IoT devices and their clients. Therefore, strong yet decentralized authentication and authorization mechanisms are necessary to mitigate these threats. In addition, despite the Department of Defense DoDs current use of IoT devices in supervisory control and data acquisition SCADA systems, and its interest in using such devices in tactical systems, adoption of IoT by has been slow mainly due to security concerns e.g., reported vulnerabilities, untrusted supply chains. At the same time, DoD recognizes the rapid pace at which the IoT commercial marketplace is evolving, and its urgency to embrace commodity technologies, to match its adversaries.
- Computer Systems Management and Standards
- Radio Communications