Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Human-centred home network security

Human-centred home network security

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Privacy by Design for the Internet of Things: Building accountability and security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter draws from across the foregoing chapters discussing many core Human Data Interaction (HDI) approaches and disciplinary perspectives to consider the specific application of HDI in home network security. While much work has considered the challenges of securing in-home Internet of Things (IoT) devices and their communications, especially for those with limited power or computational capacity, scant attention has been paid by the research community to home network security, and its acceptability and usability, from the viewpoint of ordinary citizens. It will be clear that we need a radical transformation in our approach to designing domestic networking infrastructure to guard against widespread cyber-attacks that threaten to counter the benefits of the IoT. Our aim has to be to defend against enemies inside the walls, to protect critical functionality in the home against rogue devices and to prevent the proliferation of disruptive wide-scale IoT Distributed Denial of Service (DDOS) attacks that are already occurring.

Chapter Contents:

  • 9.1 Introduction
  • 9.2 Networking background
  • 9.2.1 Network mechanisms
  • 9.3 Shaping user interaction
  • 9.3.1 Designing for control
  • 9.4 Compliance by design
  • 9.4.1 Outlining the regulatory framework with academic research
  • 9.4.2 Extracting practical insights from industrial involvement
  • 9.4.3 Shaping the prospect by informing policymaking
  • 9.4.4 Lessons of DADA on compliance by design
  • 9.5 Acknowledgement
  • References

Inspec keywords: home networks; human computer interaction; computer network security; Internet of Things

Other keywords: Human-centred home network security; HDI approaches; in-home Internet of Things device security; computational capacity; critical functionality protection; cyber-attack; human data interaction approaches; domestic networking infrastructure; DDOS attacks; disruptive wide-scale IoT distributed denial of service attacks

Subjects: Computer communications; User interfaces; Computer network security

Preview this chapter:
Zoom in
Zoomout

Human-centred home network security, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse014e/PBSE014E_ch9-1.gif /docserver/preview/fulltext/books/sc/pbse014e/PBSE014E_ch9-2.gif

Related content

content/books/10.1049/pbse014e_ch9
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address