Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    IoT security: Challenges and solutions for mining

    267607.pdf (325.9Kb)
    Access Status
    Open access
    Authors
    Barrie, Glenn
    Whyte, Andrew
    Bell, Janice
    Date
    2017
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Barrie, G. and Whyte, A. and Bell, J. 2017. IoT security: Challenges and solutions for mining, in Proceedings of the 2nd International Conference on Internet of things, Data and Cloud Computing (ICC'17), March 22-23, 2017. Cambridge, UK: Association for Computing Machinery.
    Source Title
    ACM International Conference Proceeding Series
    Source Conference
    ICC'16 Conference
    DOI
    10.1145/3018896.3018933
    ISBN
    9781450347747
    URI
    http://hdl.handle.net/20.500.11937/70206
    Collection
    • Curtin Research Publications
    Abstract

    © 2017 ACM. The Internet of Things (IoT) paradigm with its vast range of heterogeneous connecting technologies heralds a new era for internet research, especially given that this explosion in connectivity for devices or 'things' is not without risk. Scholars recognise that IoT security concerns persist and that evidence highlighting increasing cyber-security vulnerabilities requires attention. Currently IoT security literature confirms: industry confusion, lack of clear standards, interoperability fears and security problems (with reference to identity, authentication, access control, protocol and network security, privacy, and trust and governance difficulties all within the IoT technology realm). In short, there is urgent need for governance in IoT to avoid unstructured fragmentation of architectures, protocols and identification systems, and responsibilities. To address anticipated future numbers of IoT devices, a secure, scalable, yet flexible solution is needed to work across a range of technologies and dynamic environments. Specific industries such as the Western Australian (WA) Mining and Resource sector, whilst recognised as an early adopter of technology/ IoT applications, is also currently seeking security solutions that provide competitive advantage. To this end, the research being conducted here is utilising qualitative methodologies (alongside document analyses), and specific real-world/live case-studies towards relevant organisations' IoT cyber-security decision making, with a view to developing best-practice cross-party guidance(s). Work here is at its early stages; ultimately variables identified and subsequently validated shall go towards a new developed design guide for the deployment of Information Technology/ Operational Technology and IoT environments, to address IoT security concerns, applicable to (major WA mining and resources companies and) the energy and resources generally.

    Related items

    Showing items related by title, author, creator and subject.

    • Maritime Supply Chain Security in the Indo-Pacific Region: Threats and Policy Implications for National Security and Resilience
      Nguyen, Hong-Oanh; Van Balen, Michael; Ingram, Aaron; Hurd, Stephen; Chheetri, Prem; Thai, Vinh; Warren, Matthew; Booi, Kam; Oloruntoba, Richard (2022)
      By volume, about 99% of Australia’s trade is carried by sea mainly through the Indo-Pacific region. Australia currently imports 90% of liquid fuel from other countries, primarily Japan, Korea and Singapore. Global shipping ...
    • Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence
      Chang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)
      Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...
    • Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
      Elhoseny, M.; Thilakarathne, N.N.; Alghamdi, M.I.; Mahendran, R.K.; Gardezi, A.A.; Weerasinghe, H.; Welhenge, Anuradhi (2021)
      The rapid development and the expansion of Internet of Things (IoT)‐powered technologies have strengthened the way we live and the quality of our lives in many ways by combining Internet and communication technologies ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.