Assessing Identity Theft in the Internet of Things


Yousun Stilianos1* and Olga Angelopoulou2

 

1University of Staffordshire
Stafford, U.K.
stilianos.vidalis@staffs.ac.uk

 

2University of Derby
Derby, U.K.
o.angelopoulou@derby.ac.uk


Abstract

In the Internet of Things everything is interconnected. In the same context that "man-made fire" got the party started for human civilisation, ¡°man-made TCP¡± enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept any reality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns. We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.

 

Keywords: Internet of Things, Vulnerability, Information security, Identity theft

 

*Corresponding Author:
Faculty of Computing, Engineering and Sciences, K244, Octagon Building, Staffordshire University,
Beaconside, Stafford, Staffordshire, ST18 0AD, UK, Tel: +44-(0)1785 353270,
Web: http://www.staffs.ac.uk/staff/profiles/sv3.jsp

IT Convergence Practice (INPRA), Vol. 2, No. 1, pp. 15-21, March 2014 [pdf]