In this paper, we particularly focus on telepresence, specifically an all-senses meeting use case. We first identify the assets involved and the threat agents that could cause harm. This allows us to extract the model related to threat analysis and quantify the threats and the vulnerability criticality. Then, we propose the necessary mitigation mechanisms to remedy the requirements of our threat analysis. Finally, we draw conclusions that could pave the way to future avenues of research.
Full abstract in IEEEXplore DOI: 10.1109/CCNC49033.2022.9700673
Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur – Ericsson Research
Presented at IEEE 19th Annual Consumer Communications & Networking, January 8, 2022
©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse.