University of Hertfordshire

By the same authors

Assessing Identity Theft in the Internet of Things

Research output: Contribution to journalArticlepeer-review

Standard

Assessing Identity Theft in the Internet of Things. / Vidalis, Stilianos; Angelopoulou, Olga.

In: Journal of IT Convergence Practice, Vol. 2, No. 1, 01.03.2014, p. 15-21.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Author

Bibtex

@article{5abafb61b85e43a7852072a3db73e11b,
title = "Assessing Identity Theft in the Internet of Things",
abstract = "In the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept anyreality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns.We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.",
keywords = "Internet of Things, Vulnerability, Information Security, Identity theft",
author = "Stilianos Vidalis and Olga Angelopoulou",
note = "Published by Innovative Information Science & Technology Research Group (ISYOU)",
year = "2014",
month = mar,
day = "1",
language = "English",
volume = "2",
pages = "15--21",
journal = "Journal of IT Convergence Practice",
issn = "2288-0860",
number = "1",

}

RIS

TY - JOUR

T1 - Assessing Identity Theft in the Internet of Things

AU - Vidalis, Stilianos

AU - Angelopoulou, Olga

N1 - Published by Innovative Information Science & Technology Research Group (ISYOU)

PY - 2014/3/1

Y1 - 2014/3/1

N2 - In the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept anyreality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns.We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.

AB - In the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept anyreality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns.We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.

KW - Internet of Things

KW - Vulnerability

KW - Information Security

KW - Identity theft

M3 - Article

VL - 2

SP - 15

EP - 21

JO - Journal of IT Convergence Practice

JF - Journal of IT Convergence Practice

SN - 2288-0860

IS - 1

ER -