SlideShare a Scribd company logo
#IoTUK
@IoTUKNews
iotuk.org.uk
SUMMARY OF
INPUT FROM THE
OPEN CALL
Adoption and Acceptability
“Adoption & acceptability will depend on transparency and
rigor”
“A citizen can and will have multiple identities (personas)”
“Design should be informed by speaking with real people
about their fears, struggles and preferences”
“Smart cities face challenges of both scale and diversity, to
provide services in an inclusive way”
“The main barrier to acceptability is the fear of vendor lock-
in and planned obsolescence”
“Open and free-to-use demonstrators will help adoption”
12
Harnessing Economic Value
“Who will actually pay for security?”
“Safety & security is not well understood in the general
market and is thus undervalued”
“Availability of platforms is challenged by the complex and
diverse nature of IoT”
“It’s a challenge to implement required functionality in a
risk-proportionate, cost-effective, timely and convenient
way”
“The cost of developing application-specific IoT systems
needs to be dramatically reduced”
“We need to remove lengthy development cycles and share
best practices”
13
Standards, Governance and Policy
“Standards will be required to set out best practice”
“National standards will not suffice given the global nature
of the infrastructure and market”
“Standards are too fragmented, no one knows which
standards will prevail”
“Pragmatically there are enough standardised technologies
to deploy interoperable IoT”
“IoT and cyber lack proper definition”
“IoT should follow the ‘Internet Model’ of broad consensus
and running code”
“Improvements in regulation will be necessary for medical
IoT and other solutions that have physical consequences”
14
Privacy and Trust
“Trust stems from an accepted level of assurance around an
identity”
“For healthcare, we need to offset clinical benefits vs. data
privacy and ethics issues”
“Consumers need a way to determine the balance of risk”
“We need to strike a new balance between usability,
security, reliability and privacy”
“There are challenges specifically in the areas of user choice
and consent”
“Designers should make user security a priority to protect
against fraud”
“Complying with legal access requirements while preserving
privacy requires a new security architecture for IoT systems”
15
Safety and Security
“Many of our programmers are self-taught and struggle
from a lack of comprehensive guidance
“How do you do DevSecOps?
“IoT security is complex because processing power is limited
and networks are low bandwidth with small packets
“Mobile devices lack a consistent protected store (Secure
Element) to protect against malware or physical tampering”
“Implementers do not provide necessary security controls
early enough in the development life cycle”
“Limited resources of IoT devices restrict technical
approaches to security”
“Small companies that want to innovate in IoT security face
significant challenges in promoting awareness”
16

More Related Content

PDF
AIOTI presentation
PDF
IoT and Crime Prevention
PDF
PETRAS Hub Overview
PPTX
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
PDF
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
PPTX
The IoT of Energy | From Smart Products to Intelligent Solutions
PDF
20150519.io t.london
PDF
Iot tunisia forum 2017 the journey of making things happen stories of success
AIOTI presentation
IoT and Crime Prevention
PETRAS Hub Overview
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
The IoT of Energy | From Smart Products to Intelligent Solutions
20150519.io t.london
Iot tunisia forum 2017 the journey of making things happen stories of success

What's hot (20)

PPTX
Telecom & IOT
PDF
The Internet of Things
PDF
SFScon21 - Giuliana Viviano - IoT, new technology and Sustainability-Driven I...
PDF
Industry 4.0 And Beyond The A.I* For Surviving A Tech-Accelerated World
PDF
IoT Policy and Regulatory Framework
PDF
Privacy & cyber-physical security in eu cities 2016
PDF
Hyper-Connectivity and Data Proliferation - Ecosystem Perspective
PDF
IoT enabled Smart Mobility: Hype or Reality?
PPTX
Who will buy IOT products and why.
PDF
Cyber security for smart cities an architecture model for public transport
PPT
Ec, Olavi Luotonen, Barcelona, 26 March 2010
PDF
logistics and the internet of things
PDF
The Digital Telecom. Internet of Things
PDF
ITU Internet of Things Compendium 2016
 
PPTX
Business Development, Industry Solutions, Internet of Everything Cisco India ...
PDF
Boswarthick david
PDF
Cities of the Future: Where The Internet of Everything is Connecting the Unco...
PPTX
Smart & Secure City Solutions by Rupinder Singh
PDF
China IoT - Market and Ecosystm Analysis
PDF
Future of telecom in the era of Internet of Things
Telecom & IOT
The Internet of Things
SFScon21 - Giuliana Viviano - IoT, new technology and Sustainability-Driven I...
Industry 4.0 And Beyond The A.I* For Surviving A Tech-Accelerated World
IoT Policy and Regulatory Framework
Privacy & cyber-physical security in eu cities 2016
Hyper-Connectivity and Data Proliferation - Ecosystem Perspective
IoT enabled Smart Mobility: Hype or Reality?
Who will buy IOT products and why.
Cyber security for smart cities an architecture model for public transport
Ec, Olavi Luotonen, Barcelona, 26 March 2010
logistics and the internet of things
The Digital Telecom. Internet of Things
ITU Internet of Things Compendium 2016
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Boswarthick david
Cities of the Future: Where The Internet of Everything is Connecting the Unco...
Smart & Secure City Solutions by Rupinder Singh
China IoT - Market and Ecosystm Analysis
Future of telecom in the era of Internet of Things
Ad

Viewers also liked (16)

ODP
Android NDK Overview
DOCX
Danish Naeem..
PPTX
Angular and SEO
PDF
UpdatedMuhammadBilalResume.docx (1)
PDF
02 persamaan-nilai-mutlak
PDF
KHULOOD SALIM RASHID
PPTX
3 - Panorama Necto 14 application - visualization & data discovery solution
PDF
Enunc tp350-2015-2
DOCX
Conferencia
PPTX
Communication Challenges Abound for Water Utilities
PDF
Grub Tub
PDF
Edital nº 01/2015-2016 - Quiz DeMolay - Grande Capítulo
PDF
JS Lab`16. Андрей Колодницкий: "Разработка REST сервисов на SailsJS"
PDF
Konferenca o zavzetosti 2016 - Priložnosti za vse generacije - Metoda Debelja...
PDF
Konferenca o zavzetosti 2016 - Anisa Faganelj (Mediade, vodja Zlate niti - Dn...
PDF
19. SKOJ - Contemporary Internal Communications - Klavs Valskov, GE Oil & Gas
Android NDK Overview
Danish Naeem..
Angular and SEO
UpdatedMuhammadBilalResume.docx (1)
02 persamaan-nilai-mutlak
KHULOOD SALIM RASHID
3 - Panorama Necto 14 application - visualization & data discovery solution
Enunc tp350-2015-2
Conferencia
Communication Challenges Abound for Water Utilities
Grub Tub
Edital nº 01/2015-2016 - Quiz DeMolay - Grande Capítulo
JS Lab`16. Андрей Колодницкий: "Разработка REST сервисов на SailsJS"
Konferenca o zavzetosti 2016 - Priložnosti za vse generacije - Metoda Debelja...
Konferenca o zavzetosti 2016 - Anisa Faganelj (Mediade, vodja Zlate niti - Dn...
19. SKOJ - Contemporary Internal Communications - Klavs Valskov, GE Oil & Gas
Ad

Similar to Security Research Day Summary of Input (20)

PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
IoT Security and Privacy Considerations
DOCX
Security and Privacy considerations in Internet of Things
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf
PPTX
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
DOCX
The Internet of Things (IoT) brings tremendous new capabilities .docx
PDF
Trend Internet of Things
PPTX
Future of Internet.pptx
PPT
PPTX
Regulation and the Internet of Things
PDF
The importance of Quality Assurance for ICT Standardization
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
PPTX
Lecture 14
PDF
internet of thingsssssssssssssssssssssss
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
How Can Policymakers and Regulators Better Engage the Internet of Things?
PPTX
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
PDF
iotmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT Security and Privacy Considerations
Security and Privacy considerations in Internet of Things
Addressing security and privacy in io t ecosystem v0.4
IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
The Internet of Things (IoT) brings tremendous new capabilities .docx
Trend Internet of Things
Future of Internet.pptx
Regulation and the Internet of Things
The importance of Quality Assurance for ICT Standardization
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
Lecture 14
internet of thingsssssssssssssssssssssss
Secure and Smart IoT using Blockchain and AI
How Can Policymakers and Regulators Better Engage the Internet of Things?
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
iotmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm

More from IoTUK (6)

PPTX
CityVerve launch slides
PDF
SQR Systems
PDF
Trendalyze
PDF
nquiring minds
PDF
CityVerve Overview
PPTX
IoTUK Launch Event
CityVerve launch slides
SQR Systems
Trendalyze
nquiring minds
CityVerve Overview
IoTUK Launch Event

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf

Security Research Day Summary of Input

  • 2. Adoption and Acceptability “Adoption & acceptability will depend on transparency and rigor” “A citizen can and will have multiple identities (personas)” “Design should be informed by speaking with real people about their fears, struggles and preferences” “Smart cities face challenges of both scale and diversity, to provide services in an inclusive way” “The main barrier to acceptability is the fear of vendor lock- in and planned obsolescence” “Open and free-to-use demonstrators will help adoption” 12
  • 3. Harnessing Economic Value “Who will actually pay for security?” “Safety & security is not well understood in the general market and is thus undervalued” “Availability of platforms is challenged by the complex and diverse nature of IoT” “It’s a challenge to implement required functionality in a risk-proportionate, cost-effective, timely and convenient way” “The cost of developing application-specific IoT systems needs to be dramatically reduced” “We need to remove lengthy development cycles and share best practices” 13
  • 4. Standards, Governance and Policy “Standards will be required to set out best practice” “National standards will not suffice given the global nature of the infrastructure and market” “Standards are too fragmented, no one knows which standards will prevail” “Pragmatically there are enough standardised technologies to deploy interoperable IoT” “IoT and cyber lack proper definition” “IoT should follow the ‘Internet Model’ of broad consensus and running code” “Improvements in regulation will be necessary for medical IoT and other solutions that have physical consequences” 14
  • 5. Privacy and Trust “Trust stems from an accepted level of assurance around an identity” “For healthcare, we need to offset clinical benefits vs. data privacy and ethics issues” “Consumers need a way to determine the balance of risk” “We need to strike a new balance between usability, security, reliability and privacy” “There are challenges specifically in the areas of user choice and consent” “Designers should make user security a priority to protect against fraud” “Complying with legal access requirements while preserving privacy requires a new security architecture for IoT systems” 15
  • 6. Safety and Security “Many of our programmers are self-taught and struggle from a lack of comprehensive guidance “How do you do DevSecOps? “IoT security is complex because processing power is limited and networks are low bandwidth with small packets “Mobile devices lack a consistent protected store (Secure Element) to protect against malware or physical tampering” “Implementers do not provide necessary security controls early enough in the development life cycle” “Limited resources of IoT devices restrict technical approaches to security” “Small companies that want to innovate in IoT security face significant challenges in promoting awareness” 16