Securing the life-cycle of Smart Environments (video)

This one-hour talk by David Kotz was presented at ARM Research in Austin, TX at the end of January 2019.  The first half covers some recent THaW research about Wanda and SNAP and the second half lays out some security challenges in the Internet of Things.  Watch the video below.

Abstract: The homes, offices, and vehicles of tomorrow will be embedded with numerous “Smart Things,” networked with each other and with the Internet. Many of these Things interact with their environment, with other devices, and with human users – and yet most of their communications occur invisibly via wireless networks.  How can users express their intent about which devices should communicate – especially in situations when those devices have never encountered each other before?   We present our work exploring novel combinations of physical proximity and user interaction to ensure user intent in establishing and securing device interactions. 

What happens when an occupant moves out or transfers ownership of her Smart Environment?  How does an occupant identify and decommission all the Things in an environment before she moves out?  How does a new occupant discover, identify, validate, and configure all the Things in the environment he adopts?  When a person moves from smart home to smart office to smart hotel, how is a new environment vetted for safety and security, how are personal settings migrated, and how are they securely deleted on departure?  When the original vendor of a Thing (or the service behind it) disappears, how can that Thing (and its data, and its configuration) be transferred to a new service provider?  What interface can enable lay people to manage these complex challenges, and be assured of their privacy, security, and safety?   We present a list of key research questions to address these important challenges.

This entry was posted in video and tagged , , , , , , , , , , by David Kotz. Bookmark the permalink.

About David Kotz

David Kotz is the Champion International Professor in the Department of Computer Science. He previously served as Interim Provost, as Associate Dean of the Faculty for the Sciences, as the Executive Director of the Institute for Security Technology Studies, and on the US Healthcare IT Policy Committee. His research interests include security and privacy, pervasive computing for healthcare, and wireless networks. He has published over 175 refereed journal and conference papers and obtained over $66m in grant funding. He is an Fellow of the IEEE, a Distinguished Member of the ACM, a 2008 Fulbright Fellow to India, and an elected member of Phi Beta Kappa. After receiving his A.B. in Computer Science and Physics from Dartmouth in 1986, he completed his Ph.D in Computer Science from Duke University in 1991 and returned to Dartmouth to join the faculty. For more information see http://www.cs.dartmouth.edu/~dfk/.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s