Show simple item record

dc.contributor.authorBarrie, Glenn
dc.contributor.authorWhyte, Andrew
dc.contributor.authorBell, Janice
dc.date.accessioned2018-08-08T04:43:51Z
dc.date.available2018-08-08T04:43:51Z
dc.date.created2018-08-08T03:50:42Z
dc.date.issued2017
dc.identifier.citationBarrie, G. and Whyte, A. and Bell, J. 2017. IoT security: Challenges and solutions for mining, in Proceedings of the 2nd International Conference on Internet of things, Data and Cloud Computing (ICC'17), March 22-23, 2017. Cambridge, UK: Association for Computing Machinery.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/70206
dc.identifier.doi10.1145/3018896.3018933
dc.description.abstract

© 2017 ACM. The Internet of Things (IoT) paradigm with its vast range of heterogeneous connecting technologies heralds a new era for internet research, especially given that this explosion in connectivity for devices or 'things' is not without risk. Scholars recognise that IoT security concerns persist and that evidence highlighting increasing cyber-security vulnerabilities requires attention. Currently IoT security literature confirms: industry confusion, lack of clear standards, interoperability fears and security problems (with reference to identity, authentication, access control, protocol and network security, privacy, and trust and governance difficulties all within the IoT technology realm). In short, there is urgent need for governance in IoT to avoid unstructured fragmentation of architectures, protocols and identification systems, and responsibilities. To address anticipated future numbers of IoT devices, a secure, scalable, yet flexible solution is needed to work across a range of technologies and dynamic environments. Specific industries such as the Western Australian (WA) Mining and Resource sector, whilst recognised as an early adopter of technology/ IoT applications, is also currently seeking security solutions that provide competitive advantage. To this end, the research being conducted here is utilising qualitative methodologies (alongside document analyses), and specific real-world/live case-studies towards relevant organisations' IoT cyber-security decision making, with a view to developing best-practice cross-party guidance(s). Work here is at its early stages; ultimately variables identified and subsequently validated shall go towards a new developed design guide for the deployment of Information Technology/ Operational Technology and IoT environments, to address IoT security concerns, applicable to (major WA mining and resources companies and) the energy and resources generally.

dc.titleIoT security: Challenges and solutions for mining
dc.typeConference Paper
dcterms.source.titleACM International Conference Proceeding Series
dcterms.source.seriesACM International Conference Proceeding Series
dcterms.source.isbn9781450347747
dcterms.source.conferenceICC'16 Conference
dcterms.source.placeUK
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record