Skip to main content
  • 845 Accesses

Abstract

While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. In this chapter, the context, motivation, and objectives of the book are given, and contributions are outlined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Weagle, Stephanie. Financial impact of Mirai DDoS attack on Dyn revealed in new data. [Online]. Available: https://www.corero.com/blog/797-financial-impact-of-mirai-ddos-attack-on-dyn-revealed-in-new-data.html. Accessed 2018-03-05.

  2. Elisa Bertino and Nayeem Islam. Botnets and internet of things security. Computer, 50(2):76–79, 2017.

    Article  Google Scholar 

  3. Igor Bisio, Alessandro Delfino, Fabio Lavagetto, and Andrea Sciarrone. Enabling IoT for in-home rehabilitation: Accelerometer signals classification methods for activity and movement recognition. IEEE Internet of Things Journal, 4(1):135–146, 2017.

    Article  Google Scholar 

  4. Canonical Ltd. Who should bear the cost of iot security: consumers or vendors? [Online]. Available: https://insights.ubuntu.com/2017/02/07/who-should-bear-the-cost-of-iot-security-consumers-or-vendors/. Accessed 2018-03-05.

  5. Marie Chan, Daniel Estève, Jean-Yves Fourniols, Christophe Escriba, and Eric Campo. Smart wearable systems: Current status and future challenges. Artificial intelligence in medicine, 56(3):137–156, 2012.

    Article  Google Scholar 

  6. Riccardo Coppola and Maurizio Morisio. Connected car: technologies, issues, future trends. ACM Computing Surveys (CSUR), 49(3):46, 2016.

    Google Scholar 

  7. Centric Digital. Internet of things applications part 2: The mining industry. [Online]. Available: https://centricdigital.com/blog/digital-trends/internet-of-things-applications-pt2-the-mining-industry/. Accessed 2018-03-05.

  8. Mari Carmen Domingo. An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35(2):584–596, 2012.

    Article  Google Scholar 

  9. André G Ferreira, Duarte Fernandes, Sérgio Branco, João L Monteiro, Jorge Cabral, André P Catarino, and Ana M Rocha. A smart wearable system for sudden infant death syndrome monitoring. In Industrial Technology (ICIT), 2016 IEEE International Conference on, pages 1920–1925. IEEE, 2016.

    Google Scholar 

  10. U.S. Food and Drug Administration. Cybersecurity vulnerabilities identified in St. Jude medical’s implantable cardiac devices and merlin@home transmitter: FDA safety communication. [Online]. Available: https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm. Accessed 2018-03-05.

  11. Franceschi-Bicchierai, Lorenzo. How this internet of things stuffed animal can be remotely turned into a spy device. [Online]. Available: https://motherboard.vice.com/en_us/article/qkm48b/how-this-internet-of-things-teddy-bear-can-be-remotely-turned-into-a-spy-device. Accessed 2018-03-05.

  12. The Guardian. Team of hackers take remote control of tesla models from 12 miles away. [Online]. Available: https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese-hack-remote-control-brakes. Accessed 2018-03-05.

  13. Ben Herzberg, Dima Bekerman, and Igal Zifman. Breaking down mirai: An iot ddos botnet analysis. [Online]. Available: https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html. Accessed 2018-03-05.

  14. In association with the Korea Research Institute for Human Settlements (KRIHS) Inter-American Development Bank (IDB). Smart cities - international case studies. [Online]. Available: http://www.iadb.org/en/topics/emerging-and-sustainable-cities/international-case-studies-of-smart-cities.20271.html. Accessed 2018-03-05.

  15. Cara McGoogan. BMW, Audi and Toyota cars can be unlocked and started with hacked radios. [Online]. Available: http://www.telegraph.co.uk/technology/2016/03/23/hackers-can-unlock-and-start-dozens-of-high-end-cars-through-the/. Accessed 2018-03-05.

  16. Patel, Prachi. Autism glass takes top student health tech prize. [Online]. Available: https://www.scientificamerican.com/article/autism-glass-takes-top-student-health-tech-prize-slide-show1/. Accessed 2018-03-05.

  17. Mark Prigg. How to get green lights all the way to work: Hackers reveal how simple it is to control traffic lights in major cities using just a laptop. [Online]. Available: http://www.dailymail.co.uk/sciencetech/article-2730096/How-green-lights-way-work-Hackers-reveal-simple-control-traffic-lights-major-cities-using-just-laptop.html. Accessed 2018-03-05.

  18. Stanford University. The autism glass project at Stanford medicine. [Online]. Available: http://autismglass.stanford.edu/. Accessed 2018-03-05.

  19. Mark Stanislav and Tod Beardsley. Hacking iot: A case study on baby monitor exposures and vulnerabilities. Rapid 7, 2015. [Online]. Available: https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf. Accessed 2018-03-05.

  20. Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, page 5. ACM, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bou-Harb, E., Neshenko, N. (2020). Introduction. In: Cyber Threat Intelligence for the Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-45858-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45858-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45857-7

  • Online ISBN: 978-3-030-45858-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics