Articles Data Breaches and Identity Theft | Page 4
Cyber security and the Internet of Things 67
7. Is the current design protected against threats?
8. What security mechanisms could be used against threats?
The remainder of this paper is organized as follows. Section 2 pro-
vides a background, definitions, and the primary security and privacy goals.
Section 3 identifies some attacker motivations and capabilities, and provides
an outline of various sorts of threat actors. Finally, the paper concludes with
Section 4.
2 Background
The IoT [1, 2, 11] is an extension of the Internet into the physical world
for interaction with physical entities from the surroundings. Entities, devices
and services [12] are key concepts within the IoT domain, as depicted
in Figure 1 [13]. They have different meanings and definitions among
various projects. Therefore, it is necessary to have a good understand-
ing of what IoT entities, devices and services are (discussed in detail in
Section 2.1).
An entity in the IoT could be a human, animal, car, logistic chain item,
electronic appliance or a closed or open environment [14]. Interaction among
Figure 1 IoT model: key concepts and interactions.