Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards
This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that...
Ausführliche Beschreibung
Autor*in: |
Piasecki, Stanislaw [verfasserIn] Urquhart, Lachlan [verfasserIn] McAuley, Professor Derek [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: No title available - 42 |
---|---|
Übergeordnetes Werk: |
volume:42 |
DOI / URN: |
10.1016/j.clsr.2021.105542 |
---|
Katalog-ID: |
ELV006687385 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV006687385 | ||
003 | DE-627 | ||
005 | 20230510092119.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230505s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.clsr.2021.105542 |2 doi | |
035 | |a (DE-627)ELV006687385 | ||
035 | |a (ELSEVIER)S0267-3649(21)00015-7 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Piasecki, Stanislaw |e verfasserin |4 aut | |
245 | 1 | 0 | |a Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
264 | 1 | |c 2021 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. | ||
650 | 4 | |a Internet of Things | |
650 | 4 | |a Smart homes | |
650 | 4 | |a Standards | |
650 | 4 | |a Security | |
650 | 4 | |a Cloud | |
650 | 4 | |a Edge computing | |
700 | 1 | |a Urquhart, Lachlan |e verfasserin |4 aut | |
700 | 1 | |a McAuley, Professor Derek |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t No title available |g 42 |w (DE-627)320571572 |x 0267-3649 |7 nnns |
773 | 1 | 8 | |g volume:42 |
912 | |a GBV_USEFLAG_U | ||
912 | |a SYSFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_647 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2037 | ||
912 | |a GBV_ILN_2129 | ||
951 | |a AR | ||
952 | |d 42 |
author_variant |
s p sp l u lu p d m pd pdm |
---|---|
matchkey_str |
article:02673649:2021----::eecaanthdratfcsmrhmcbrrmsnc |
hierarchy_sort_str |
2021 |
publishDate |
2021 |
allfields |
10.1016/j.clsr.2021.105542 doi (DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 DE-627 ger DE-627 rda eng Piasecki, Stanislaw verfasserin aut Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. Internet of Things Smart homes Standards Security Cloud Edge computing Urquhart, Lachlan verfasserin aut McAuley, Professor Derek verfasserin aut Enthalten in No title available 42 (DE-627)320571572 0267-3649 nnns volume:42 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 AR 42 |
spelling |
10.1016/j.clsr.2021.105542 doi (DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 DE-627 ger DE-627 rda eng Piasecki, Stanislaw verfasserin aut Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. Internet of Things Smart homes Standards Security Cloud Edge computing Urquhart, Lachlan verfasserin aut McAuley, Professor Derek verfasserin aut Enthalten in No title available 42 (DE-627)320571572 0267-3649 nnns volume:42 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 AR 42 |
allfields_unstemmed |
10.1016/j.clsr.2021.105542 doi (DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 DE-627 ger DE-627 rda eng Piasecki, Stanislaw verfasserin aut Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. Internet of Things Smart homes Standards Security Cloud Edge computing Urquhart, Lachlan verfasserin aut McAuley, Professor Derek verfasserin aut Enthalten in No title available 42 (DE-627)320571572 0267-3649 nnns volume:42 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 AR 42 |
allfieldsGer |
10.1016/j.clsr.2021.105542 doi (DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 DE-627 ger DE-627 rda eng Piasecki, Stanislaw verfasserin aut Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. Internet of Things Smart homes Standards Security Cloud Edge computing Urquhart, Lachlan verfasserin aut McAuley, Professor Derek verfasserin aut Enthalten in No title available 42 (DE-627)320571572 0267-3649 nnns volume:42 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 AR 42 |
allfieldsSound |
10.1016/j.clsr.2021.105542 doi (DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 DE-627 ger DE-627 rda eng Piasecki, Stanislaw verfasserin aut Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. Internet of Things Smart homes Standards Security Cloud Edge computing Urquhart, Lachlan verfasserin aut McAuley, Professor Derek verfasserin aut Enthalten in No title available 42 (DE-627)320571572 0267-3649 nnns volume:42 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 AR 42 |
language |
English |
source |
Enthalten in No title available 42 volume:42 |
sourceStr |
Enthalten in No title available 42 volume:42 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Internet of Things Smart homes Standards Security Cloud Edge computing |
isfreeaccess_bool |
false |
container_title |
No title available |
authorswithroles_txt_mv |
Piasecki, Stanislaw @@aut@@ Urquhart, Lachlan @@aut@@ McAuley, Professor Derek @@aut@@ |
publishDateDaySort_date |
2021-01-01T00:00:00Z |
hierarchy_top_id |
320571572 |
id |
ELV006687385 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV006687385</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230510092119.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230505s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.clsr.2021.105542</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV006687385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0267-3649(21)00015-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Piasecki, Stanislaw</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of Things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smart homes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Edge computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Urquhart, Lachlan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McAuley, Professor Derek</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">No title available</subfield><subfield code="g">42</subfield><subfield code="w">(DE-627)320571572</subfield><subfield code="x">0267-3649</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:42</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">42</subfield></datafield></record></collection>
|
author |
Piasecki, Stanislaw |
spellingShingle |
Piasecki, Stanislaw misc Internet of Things misc Smart homes misc Standards misc Security misc Cloud misc Edge computing Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
authorStr |
Piasecki, Stanislaw |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)320571572 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
0267-3649 |
topic_title |
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards Internet of Things Smart homes Standards Security Cloud Edge computing |
topic |
misc Internet of Things misc Smart homes misc Standards misc Security misc Cloud misc Edge computing |
topic_unstemmed |
misc Internet of Things misc Smart homes misc Standards misc Security misc Cloud misc Edge computing |
topic_browse |
misc Internet of Things misc Smart homes misc Standards misc Security misc Cloud misc Edge computing |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
No title available |
hierarchy_parent_id |
320571572 |
hierarchy_top_title |
No title available |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)320571572 |
title |
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
ctrlnum |
(DE-627)ELV006687385 (ELSEVIER)S0267-3649(21)00015-7 |
title_full |
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
author_sort |
Piasecki, Stanislaw |
journal |
No title available |
journalStr |
No title available |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
zzz |
author_browse |
Piasecki, Stanislaw Urquhart, Lachlan McAuley, Professor Derek |
container_volume |
42 |
format_se |
Elektronische Aufsätze |
author-letter |
Piasecki, Stanislaw |
doi_str_mv |
10.1016/j.clsr.2021.105542 |
author2-role |
verfasserin |
title_sort |
defence against the dark artefacts: smart home cybercrimes and cybersecurity standards |
title_auth |
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
abstract |
This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. |
abstractGer |
This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. |
abstract_unstemmed |
This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices. |
collection_details |
GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_31 GBV_ILN_95 GBV_ILN_647 GBV_ILN_2003 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2010 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2026 GBV_ILN_2037 GBV_ILN_2129 |
title_short |
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards |
remote_bool |
true |
author2 |
Urquhart, Lachlan McAuley, Professor Derek |
author2Str |
Urquhart, Lachlan McAuley, Professor Derek |
ppnlink |
320571572 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1016/j.clsr.2021.105542 |
up_date |
2024-07-06T22:13:32.188Z |
_version_ |
1803869499885092864 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV006687385</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230510092119.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230505s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.clsr.2021.105542</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV006687385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0267-3649(21)00015-7</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Piasecki, Stanislaw</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of ‘routine activity theory’ to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of Things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smart homes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Edge computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Urquhart, Lachlan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McAuley, Professor Derek</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">No title available</subfield><subfield code="g">42</subfield><subfield code="w">(DE-627)320571572</subfield><subfield code="x">0267-3649</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:42</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">42</subfield></datafield></record></collection>
|
score |
7.3985205 |