A Study of Developing Security Requirements for Internet of Things ( IoT )

IoT service provides interconnection between ‘Things’ in many industry areas (home appliance, traffic, medical services, etc.). However, because of the IoT environment is consisted of various devices, network protocols, platforms, there are many security risks such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, to make a secure and safe IoT environment, identifying security requirements for IoT is very developing security requirements in IoT components and life cycle considering technical and management perspective.

[1]  Baoquan Zhang,et al.  Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[2]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[3]  N. Beheshti,et al.  Thoughts on Reliability in the Internet of Things , 2011 .

[4]  Steven B. Lipner,et al.  The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.

[5]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[6]  Jaydip Sen,et al.  Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.

[7]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[8]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..