Mohammed, 2019 - Google Patents
A reference model for securing IoT.Mohammed, 2019
View PDF- Document ID
- 9791588721707202338
- Author
- Mohammed A
- Publication year
External Links
Snippet
The Internet of Things (IoT) is a network of objects equipped with sensors, actuators, electronics, and connectivity protocols enabling object interaction without human intervention [6]. The IoT is involved in the creation of a variety of applications and services …
- 238000000034 method 0 abstract description 155
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Neshenko et al. | Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations | |
| Abdul-Ghani et al. | A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective | |
| Jurcut et al. | Introduction to IoT security | |
| Miloslavskaya et al. | Internet of Things: information security challenges and solutions | |
| Abdul-Ghani et al. | A comprehensive IoT attacks survey based on a building-blocked reference model | |
| Jamali et al. | Towards the internet of things | |
| Hashemi et al. | Internet of Things backdoors: Resource management issues, security challenges, and detection methods | |
| Fan et al. | Understanding security in smart city domains from the ANT-centric perspective | |
| Ali et al. | Cyber security for cyber physical systems | |
| Bou-Harb et al. | Cyber threat intelligence for the internet of things | |
| Jabraeil Jamali et al. | IoT security | |
| Samaila et al. | Security threats and possible countermeasures in IoT applications covering different industry domains | |
| Salayma | Risk and threat mitigation techniques in internet of things (IoT) environments: a survey | |
| Wilson | Inter-device authentication protocol for the internet of things | |
| Mahmood et al. | Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments | |
| Dhondge | Lifecycle IoT Security for Engineers | |
| Mena | Blockchain-based security framework for the internet of things and home networks | |
| Mohammed | A reference model for securing IoT. | |
| Garg et al. | Anatomy of IoT Botnets and Detection Methods | |
| Rull Aixa | Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach | |
| El Mahdi et al. | Optimized scheme to secure IoT systems based on sharing secret in multipath protocol | |
| Bou-Harb et al. | Taxonomy of IoT vulnerabilities | |
| Patil et al. | A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics | |
| TIAN | A novel lightweight mqtt security scheme for the internet of medical things | |
| Neshenko | A Network Telescope Approach for Inferring and Characterizing IoT Exploitations |