Skip navigation

Cyber and physical threats to the internet of everything

Cyber and physical threats to the internet of everything

Loukas, George and Patrikakis, Charalampos (2016) Cyber and physical threats to the internet of everything. Cutter IT Journal, 29 (7). pp. 5-11. ISSN 1522-7383

[img]
Preview
PDF (Author Accepted Manuscript)
15856 LOUKAS_Cyber_&_Physical_Threats_2016.pdf - Accepted Version

Download (537kB) | Preview

Abstract

After over 40 years of the Internet faithfully serving the needs of the Earth’s human population for information, communication, and entertainment, we have now entered the era of the IoT. Of course, when we refer to the Internet, we also mean the Web and therefore the Web of Things (WoT), where distributed applications benefitting from networking through the Internet are no longer a privilege of humans. Things can also take full advantage of the capabilities, simplicity, and potential of Web technologies and protocols. Following current developments in this field, it is not difficult to see the inevitability of the convergence of the two worlds, of humans and of things, each using the Internet as a primary means of communication. Possibly the most appropriate term to describe this evolution has been proposed by Cisco: the Internet of Everything (IoE), which "brings together people, process, data, and things to make networked connections more relevant and valuable than ever before." In the IoE era, machines are equal to humans as Internet users.

In an ecosystem in which everything is connected, and where physical and cyber converge and collaborate, the threats of the two worlds not only coexist, but also converge, creating a still largely unknown environment, in which an attack in cyberspace can propagate and have an adverse effect in physical space and vice versa. So how can we be prepared for and confront this new unknown? How can we study and learn from the ways this has been dealt with in the past? First, it is important to simplify the problem by attempting to identify the components of IoE and the threats and effects an attack can have in each one.

Item Type: Article
Uncontrolled Keywords: Cyber security; IoT; computer networks
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Architecture, Computing & Humanities
Faculty of Architecture, Computing & Humanities > Department of Computing & Information Systems
Last Modified: 05 Jun 2019 14:45
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: None
URI: http://gala.gre.ac.uk/id/eprint/15856

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics