Abstract
The ubiquity of mobile devices and the increasing penetration of “smart” home devices and autonomous vehicles are the first signs of the Internet of Things . When all of your personal devices, your appliances, your car, and your home become “smart” and connected there are a number of issues that will need to be addressed including privacy, transparency, open access, and publicity. Who collects your data, where it is stored, and how it is stored and transmitted will all be important topics going forward. Cryptology will be central to all of these questions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Scrum is an agile software development process. At each daily standup meeting each developer answers three questions: (1) What did you do since yesterday? (2) What are you going to do between now and the next standup meeting? And (3) is there anything getting in your way? This brings all the team members up to speed on the current status of the project.
- 2.
Many of these security holes and proposed resolutions are suggested in https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/ (Retrieved 02/22/2018).
- 3.
- 4.
- 5.
- 6.
- 7.
References
Department of Justice. 2017. Justice Department Announces Charges And Guilty Pleas In Three Computer Crime Cases Involving Significant Cyber Attacks. U.S. Department of Justice. https://www.justice.gov/usao-nj/pr/justice-department-announces-charges-and-guilty-pleas-three-computer-crime-cases
Federal Bureau of Investigation. 2015. Internet of Things Poses Opportunities for Cyber Crime. Public Service Announcement I-091015-PSA. Washington, DC: Federal Bureau of Investigation. https://www.ic3.gov/media/2015/150910.aspx
Latta, Robert. 2017. Safely Ensuring Lives Future Deployment and Research In Vehicle Evolution Act or the SELF DRIVE Act. https://www.congress.gov/115/bills/hr3388/BILLS-115hr3388rfs.pdf
Miller, Charlie, and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. St. Louis. http://illmatics.com/Remote%20Car%20Hacking.pdf
Stanislav, Mark, and Tod Beardsley. 2015. HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. White Paper. Boston: Rapid7. https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf
Warner, Mark. 2017. Internet of Things (IoT) Cybersecurity Improvement Act of 2017. https://www.congress.gov/bill/115th-congress/senate-bill/1691/text?format=txt
Zamora, Wendy. 2017. IoT Security: What Is and What Should Never Be. MalwareBytes Labs 101 (blog). December 6, 2017. https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Dooley, J.F. (2018). Cryptology and the Internet of Things. In: History of Cryptography and Cryptanalysis. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-90443-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-90443-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90442-9
Online ISBN: 978-3-319-90443-6
eBook Packages: Computer ScienceComputer Science (R0)