TY - GEN
T1 - Towards IoT Security Automation and Orchestration
AU - Zheng, Yifeng
AU - Pal, Arindam
AU - Abuadbba, Sharif
AU - Pokhrel, Shiva Raj
AU - Nepal, Surya
AU - Janicke, Helge
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2021/1
Y1 - 2021/1
N2 - The massive boom of Internet of Things (IoT) has led to the explosion of smart IoT devices and the emergence of various applications such as smart cities, smart grids, smart mining, connected health, and more. While the proliferation of IoT systems promises many benefits for different sectors, it also exposes a large attack surface, raising an imperative need to put security in the first place. It is impractical to heavily rely on manual operations to deal with security of massive IoT devices and applications. Hence, there is a strong need for securing IoT systems with minimum human intervention. In light of this situation, in this paper, we envision security automation and orchestration for IoT systems. After conducting a comprehensive evaluation of the literature and having conversations with industry partners, we envision a framework integrating key elements towards this goal. For each element, we investigate the existing landscapes, discuss the current challenges, and identify future directions. We hope that this paper will bring the attention of the academic and industrial community towards solving challenges related to security automation and orchestration for IoT systems.
AB - The massive boom of Internet of Things (IoT) has led to the explosion of smart IoT devices and the emergence of various applications such as smart cities, smart grids, smart mining, connected health, and more. While the proliferation of IoT systems promises many benefits for different sectors, it also exposes a large attack surface, raising an imperative need to put security in the first place. It is impractical to heavily rely on manual operations to deal with security of massive IoT devices and applications. Hence, there is a strong need for securing IoT systems with minimum human intervention. In light of this situation, in this paper, we envision security automation and orchestration for IoT systems. After conducting a comprehensive evaluation of the literature and having conversations with industry partners, we envision a framework integrating key elements towards this goal. For each element, we investigate the existing landscapes, discuss the current challenges, and identify future directions. We hope that this paper will bring the attention of the academic and industrial community towards solving challenges related to security automation and orchestration for IoT systems.
KW - configuration
KW - IoT
KW - security
KW - security automation
KW - security orchestration
UR - http://www.scopus.com/inward/record.url?scp=85100435134&partnerID=8YFLogxK
U2 - 10.1109/TPS-ISA50397.2020.00018
DO - 10.1109/TPS-ISA50397.2020.00018
M3 - Conference article published in proceeding or book
AN - SCOPUS:85100435134
T3 - Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020
SP - 55
EP - 63
BT - Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020
Y2 - 1 December 2020 through 3 December 2020
ER -