Defence against the dark artefacts:Smart home cybercrimes and cybersecurity standards

This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of 'routine activity theory' to situate our critique. Our study s...

Full description

Saved in:  
Bibliographic Details
Main Author: McAuley, Derek (Author)
Contributors: Urquhart, Lachlan ; Piasecki, Stanislaw
Format: Electronic Book
Language:English
Published: 2021
In:Year: 2021
Online Access: Volltext (kostenfrei)
Volltext (kostenfrei)
Check availability: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866140469
003 DE-627
005 20250113054901.0
007 cr uuu---uuuuu
008 231018s2021 xx |||||o 00| ||eng c
024 7 |a 10.1016/j.clsr.2021.105542  |2 doi 
035 |a (DE-627)1866140469 
035 |a (DE-599)KXP1866140469 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a McAuley, Derek  |e VerfasserIn  |4 aut 
245 1 0 |a Defence against the dark artefacts:Smart home cybercrimes and cybersecurity standards 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This paper analyses the assumptions underpinning a range of emerging EU and UK smart home cybersecurity standards. We use internet of things (IoT) case studies (such as the Mirai Botnet affair) and the criminological concept of 'routine activity theory' to situate our critique. Our study shows that current cybersecurity standards mainly assume smart home environments are (and will continue to be) underpinned by cloud architectures. This is a shortcoming in the longevity of standards. This paper argues that edge computing approaches, such as personal information management systems, are emerging for the IoT and challenge the cloud focused assumptions of these standards. In edge computing, data can be stored in a decentralised manner, locally and analysed on the client using federated learning. This can have advantages for security, privacy and legal compliance, over centralised cloud-based approaches, particularly around cross border data flows and edge based security analytics. As a consequence, standards should start to reflect the increased interest in this trend to make them more aspirational and responsive for the long term; as ultimately, current IoT architectures are a choice, as opposed to inherent. Our paper unpacks the importance of the adoption of edge computing models which could enable better management of external cyber-criminality threats in smart homes. We also briefly discuss challenges of building smart homes that can accommodate the complex nature of everyday life in the home. In addition to technical aspects, the social and interactional complexities of the home mean internal threats can also emerge. As these human factors remain unresolved in current approaches to smart home cybersecurity, a user's security can be impacted by such technical design choices 
700 1 |a Urquhart, Lachlan  |e VerfasserIn  |4 aut 
700 1 |a Piasecki, Stanislaw  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/475141365.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
856 4 0 |u https://doi.org/10.1016/j.clsr.2021.105542  |x Resolving-System  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391821222 
LOK |0 003 DE-627 
LOK |0 004 1866140469 
LOK |0 005 20231018043702 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE9023485 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw