Security and privacy of things: Regulatory challenges and gaps for the secure integration of cyber-physical systems

Geraldine Lee, Gregory Epiphaniou*, Haider Al-Khateeb, Carsten Maple

*Corresponding author for this work

Research output: Chapter in Book/Published conference outputChapter


The rise of interconnected “intelligent” objects that move their capabilities from sensing and data processing to decision making will be a disruptive phenomenon that further widens the gaps between legal, regulatory and technological approaches. This research sets out to establish a guided road map through the maze of regulation by incorporating the fragmented governance efforts into a single focus where security and privacy gaps unique to machine-to-machine communication (M2M) are identified against key performance metrics. We use privacy, ethics, trust, legality, data sharing, operational integration and device and communication protocols as our key performance metrics to highlight areas of significant overlap and gaps in a comprehensive list of standards to assist policymakers and researchers in the field. Results also indicate that policy concerns and diffused responses from existing standards raise unacceptable risks for the cyber and physical spheres in the IoT preventing their integration with existing hierarchical security architectures and reducing the opportunities for mass-market economies of scale.

Original languageEnglish
Title of host publicationThird International Congress on Information and Communication Technology
Subtitle of host publicationICICT 2018, London
EditorsXin-She Yang, imon Sherratt, Nilanjan Dey, Amit Joshi
PublisherSpringer Singapore
Number of pages12
ISBN (Electronic)978-981-13-1165-9
ISBN (Print)978-981-13-1164-2
Publication statusE-pub ahead of print - 29 Sept 2018

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSpringer Cham
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Bibliographical note

© Springer Nature B.V. 2019. The final publication is available at Springer via Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way.


  • Cyber-physical systems
  • Governance
  • Internet of things
  • Machine-to-machine


Dive into the research topics of 'Security and privacy of things: Regulatory challenges and gaps for the secure integration of cyber-physical systems'. Together they form a unique fingerprint.

Cite this