skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: A Hazard Analysis Technique for the Internet of Things (IoT) and Mobile

Authors:
Publication Date:
Research Org.:
Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1408079
Report Number(s):
LLNL-CONF-727317
DOE Contract Number:
AC52-07NA27344
Resource Type:
Conference
Resource Relation:
Conference: Presented at: STAMP Workshop 2017, Cambridge, MA, United States, Mar 28 - Mar 30, 2017
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE

Citation Formats

Pope, G. A Hazard Analysis Technique for the Internet of Things (IoT) and Mobile. United States: N. p., 2017. Web.
Pope, G. A Hazard Analysis Technique for the Internet of Things (IoT) and Mobile. United States.
Pope, G. Fri . "A Hazard Analysis Technique for the Internet of Things (IoT) and Mobile". United States. doi:. https://www.osti.gov/servlets/purl/1408079.
@article{osti_1408079,
title = {A Hazard Analysis Technique for the Internet of Things (IoT) and Mobile},
author = {Pope, G},
abstractNote = {},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Fri Mar 17 00:00:00 EDT 2017},
month = {Fri Mar 17 00:00:00 EDT 2017}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share:
  • Abstract not provided.
  • Abstract— The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for illicit surveillance through lifestyle analysis, unauthorized access to information, and new attack vectors will continue to increase by 2020, when up-to 50 billion devices may be connected. This paper discusses various kinds of vulnerabilities that can be expected to arise, and presents a research agenda for mitigating the worst of the impacts. We hope tomore » draw research attention to the potential dangers of IoT so that many of these problems can be avoided.« less
  • The so-called Internet of Things concept has captured much attention recently as ordinary devices are connected to the Internet for monitoring and control purposes. One enabling technology is the proliferation of low-cost, single board computers with built-in network interfaces. Some of these are capable of hosting full-fledged operating systems that provide rich programming environments. Taken together, these features enable inexpensive solutions for even traditional tasks such as the one presented here for electrical power monitoring and outage reporting.
  • Abstract not provided.