Articles Data Breaches and Identity Theft | Page 4

Cyber security and the Internet of Things 67 7. Is the current design protected against threats? 8. What security mechanisms could be used against threats? The remainder of this paper is organized as follows. Section 2 pro- vides a background, definitions, and the primary security and privacy goals. Section 3 identifies some attacker motivations and capabilities, and provides an outline of various sorts of threat actors. Finally, the paper concludes with Section 4. 2 Background The IoT [1, 2, 11] is an extension of the Internet into the physical world for interaction with physical entities from the surroundings. Entities, devices and services [12] are key concepts within the IoT domain, as depicted in Figure 1 [13]. They have different meanings and definitions among various projects. Therefore, it is necessary to have a good understand- ing of what IoT entities, devices and services are (discussed in detail in Section 2.1). An entity in the IoT could be a human, animal, car, logistic chain item, electronic appliance or a closed or open environment [14]. Interaction among Figure 1 IoT model: key concepts and interactions.