Internet of Things: Privacy and Security

#IoT #Security
Share

Presentation:

We are entering an Internet of Things (IoT) era. It is widely recognized that computer security and privacy for an IoT ecosystem is fundamentally important and challenging. It is important because security and privacy lapses in IoT devices can cause financial, social, and physical harms to people and their environments. It is challenging because of the technical properties of IoT devices and because of the complex issues that arise when designing technologies for diverse stakeholders.

Any significant advance in the state of the art in security and privacy for an IoT ecosystem will require a large, interdisciplinary effort that takes into account not only the technical side, but considers how groups of stakeholders interact with the technology. Making such advances is the goal of our proposal. The talk propose a holistic approach to IoT security and privacy, blending research in human-computer interaction, computer security, cryptography, and ubiquitous computing. We envision our work providing a strong and broad foundation for improving the security and privacy of future IoT systems; we will work with key stakeholders throughout the project to ensure our work has the greatest possible breadth, depth, and impact.

The talk focus is primarily be on IoT devices in the home. This environment is one of the most complex environments in which to consider IoTsecurity and privacy, due in part to the diversity of stakeholders involved, their complex social relationships, and the diversity of computer security and privacy expertise within and between homes.

The talk considers IoT security and privacy along multiple axes: stakeholders involved (e.g, device owner, family members, friends, hired help), the lifecycle of IoT devices (development, installation, use, and abandonment), the potential harms to stakeholders (e.g., physical harms to people or property, privacy exposures from IoT sensor data, or the adversarial use of IoT devices as stepping stones to compromise other computers),ease of use of security solutions, mental models of different stakeholders, security and privacy risks that might arise both during normal use (e.g., because of poor configuration options) and risks that might arise as a result of adversarial action (e.g., adversary compromising a back-end database or a device in the home).

 



  Date and Time

  Location

  Hosts

  Registration



  • Add_To_Calendar_icon Add Event to Calendar
  • 1415 Engineering Drive
  • (Parking in Lot 17)
  • Madison, Wisconsin
  • United States 53706
  • Building: Engineering Hall
  • Room Number: 1610 Lecture Hall
  • Click here for Map

  • Contact Event Host
  • Co-sponsored by UW-Madison IEEE Student Chapter, Society of Women Engineers
  • Starts 18 October 2018 05:31 PM UTC
  • Ends 09 November 2018 12:20 AM UTC
  • No Admission Charge
  • Menu: Veggie Pizza, Meat Pizza


  Speakers

Dr. Camp Dr. Camp of School of Iformatics and Computing, Indiana University

Topic:

IoT: Security and Privacy

We are entering an Internet of Things (IoT) era. It is widely recognized that computer security and privacy for an IoT ecosystem is fundamentally important and challenging. It is important because security and privacy lapses in IoT devices can cause financial, social, and physical harms to people and their environments. It is challenging because of the technical properties of IoT devices and because of the complex issues that arise when designing technologies for diverse stakeholders.

Any significant advance in the state of the art in security and privacy for an IoT ecosystem will require a large, interdisciplinary effort that takes into account not only the technical side, but considers how groups of stakeholders interact with the technology. Making such advances is the goal of our proposal. The talk propose a holistic approach to IoT security and privacy, blending research in human-computer interaction, computer security, cryptography, and ubiquitous computing. We envision our work providing a strong and broad foundation for improving the security and privacy of future IoT systems; we will work with key stakeholders throughout the project to ensure our work has the greatest possible breadth, depth, and impact.

The talk focus is primarily be on IoT devices in the home. This environment is one of the most complex environments in which to consider IoTsecurity and privacy, due in part to the diversity of stakeholders involved, their complex social relationships, and the diversity of computer security and privacy expertise within and between homes.

The talk considers IoT security and privacy along multiple axes: stakeholders involved (e.g, device owner, family members, friends, hired help), the lifecycle of IoT devices (development, installation, use, and abandonment), the potential harms to stakeholders (e.g., physical harms to people or property, privacy exposures from IoT sensor data, or the adversarial use of IoT devices as stepping stones to compromise other computers),ease of use of security solutions, mental models of different stakeholders, security and privacy risks that might arise both during normal use (e.g., because of poor configuration options) and risks that might arise as a result of adversarial action (e.g., adversary compromising a back-end database or a device in the home).

Biography:

L. Jean Camp is a Professor at the School of Informatics and Computing at Indiana University. She is a Fellow of the Institute of Electrical and Electronic Engineers. She is a  Fellow of the American Association for the Advancement of Science.  She joined Indiana after eight years at Harvard’s Kennedy School where her courses were also listed in Harvard Law, Harvard Business, and the Engineering Systems Division of MIT.  She spent the year after earning her doctorate from Carnegie Mellon as a Senior Member of the Technical Staff at Sandia National Laboratories. She began her career as an engineer at Catawba Nuclear Station with a MSEE at University of North Carolina at Charlotte.  Her research focuses on the intersection of human and technical trust, leveraging economic models and human-centered design to create safe, secure systems. Her early contributions in the interdisciplines of economics of security, user-centered security, risk communication, and online trust underlie her applied research in the domains of IoT, authentication, secure networking, ecrime, ethics in computer science, and a few works on applied cryptography. 


Email:





Agenda

5:15 - 5:30 PM social time & pizza!

5:30 to 6:30 PM presentation