A4 Refereed article in a conference publication
Understanding software obfuscation and diversification as defensive measures for the cybersecurity of Internet of Things
Authors: Rauti Sampsa, Laato Samuli
Editors: Tung X. Bui
Conference name: Hawaii International Conference on System Sciences
Publisher: IEEE Computer Society
Publication year: 2023
Journal: Proceedings of the Annual Hawaii International Conference on System Sciences
Book title : Proceedings of the 56th Annual Hawaii International Conference on System Sciences
Journal name in source: Proceedings of the Annual Hawaii International Conference on System Sciences
Series title: Proceedings of the Annual Hawaii International Conference on System Sciences
First page : 6645
Last page: 6654
ISBN: 978-0-9981331-6-4
eISSN: 2572-6862
Web address : https://hdl.handle.net/10125/103438
Self-archived copy’s web address: https://research.utu.fi/converis/portal/detail/Publication/179594661
Internet of Things (IoT) has emerged as an umbrella term to describe connecting smart everyday objects (such as washing machines, toilets and sound systems), sensors and industrial machines to the internet. While IoT devices hold potential to greatly enhance quality of life through automating and optimizing mundane tasks, there are a great deal of security and privacy challenges. For this reason, practitioners and academics have explored various ways to enhance the multi-layered security of IoT devices. One of these methods is obfuscation, which has been successfully applied to make accessing devices more difficult for adversaries. In this study, we systematically processed the literature on applying obfuscation and diversification to improve IoT cybersecurity (81 articles) and clustered this research according the obfuscation target (code, data, interface, location, traffic). We then conducted a follow-up bibliometric review of the entire research profile of IoT cybersecurity (3,682 articles) to understand how these obfuscation and diversification approaches relate to the general cybersecurity landscape and solutions of IoT. We also derive a comprehensive list of benefits and shortcomings of enhancing IoT security through diversification, and present points of departure for future research.
Downloadable publication This is an electronic reprint of the original article. |