File(s) under permanent embargo
Towards IoT security automation and orchestration
conference contribution
posted on 2020-01-01, 00:00 authored by Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva PokhrelShiva Pokhrel, Surya Nepal, Helge JanickeThe massive boom of Internet of Things (IoT) has led to the explosion of smart IoT devices and the emergence of various applications such as smart cities, smart grids, smart mining, connected health, and more. While the proliferation of IoT systems promises many benefits for different sectors, it also exposes a large attack surface, raising an imperative need to put security in the first place. It is impractical to heavily rely on manual operations to deal with security of massive IoT devices and applications. Hence, there is a strong need for securing IoT systems with minimum human intervention. In light of this situation, in this paper, we envision security automation and orchestration for IoT systems. After conducting a comprehensive evaluation of the literature and having conversations with industry partners, we envision a framework integrating key elements towards this goal. For each element, we investigate the existing landscapes, discuss the current challenges, and identify future directions. We hope that this paper will bring the attention of the academic and industrial community towards solving challenges related to security automation and orchestration for IoT systems.
History
Event
TPS-ISA Trust, Privacy and Security in Intelligent Systems and Applicaitons. IEEE International Conference (2nd : 2020 : Virtual)Pagination
55 - 63Publisher
IEEE Computer SocietyLocation
Atlanta, Georgia (Virtual)Place of publication
Los Alamitos, Calif.Publisher DOI
Start date
2020-12-01End date
2020-12-03ISBN-13
9781728185439Language
engNotes
10.1109/TPS-ISA50397.2020.00018 DOI Error Not Found Use non-DOI to access articlePublication classification
E1 Full written paper - refereedCopyright notice
2020, Institute of Electrical and Electronics EngineersTitle of proceedings
TPS-ISA 2020 : Proceedings of IEEE's 2nd International Conference on Trust, Privacy and Security in Intelligent Systems and ApplicationsUsage metrics
Categories
No categories selectedLicence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC