Secure Smart Cities

Authors: Cristian PASCARIU & Ionut – Daniel BARBU

Published: SRAC CCF 2016 

Abstract:

This article approaches the subject of “Internet of Things” applied to larger environments such as Cities and the security risks involved around protecting data. The research was driven by a session of tests carried out on a development board targeted at building small IoT projects in an attempt to study hardware and software limitations. With new embedded architectures emerging, new types of vulnerabilities are discovered, the main goal of this article to promote new security guidelines for mitigating the security risks of Smart Cities.

References:

1) Introducing the Adafruit WICED Feather Wifi, TOWNSEND K., 2016, https://cdn-learn.adafruit.com/downloads/pdf/introducing-the- adafruit-wiced-feather- wifi.pdf

2) The Internet of Everything for Cities, Shane M., Villa N.,Stewart-weeks M., Lange A., Cisco,2013, http://www.cisco.com/c/dam/en_us/solutions/industries/docs/gov/everything-for- cities.pdf

3) MQTT Security Fundamentals, HiveMQ blog http://www.hivemq.com/blog/introducing-the- mqtt-security-fundamentals

4) Hackers are holding hospital computers hostage, Wired,2016: https://www.wired.com/2016/02/hack-brief- hackers-are-holding- an-la- hospitals-computers- hostage/

5) An Internet of Things Reference Architecture, Symantec, https://www.symantec.com/content/en/us/enterprise/white_papers/iot-security- reference-architecture- wp-en.pdf

6) State of the Market The Internet of Things 2015, Verizon, http://www.verizonenterprise.com/resources/reports/rp_state-of-market- the-market- the-internet- of-things-2015_en_xg.pdf

7) Principles of IoT Security, OWASP, reviewed on May 2016, https://www.owasp.org/index.php/Principles_of_IoT_Security

8) IoT Framework Assessment, OWASP, 2016, https://www.owasp.org/index.php/IoT_Framework_Assessment

9) Certification Authorities, Wikipedia, https://en.wikipedia.org/wiki/Certificate_authority

10) How over 30 Jeeps were Hacked into and Driven Away, Hackread, 2016, https://www.hackread.com/30-jeeps-hacked-driven- away/

Advertisements

Leave a comment

Filed under Articles, Talks

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s