[go: up one dir, main page]

Mohammed, 2019 - Google Patents

A reference model for securing IoT.

Mohammed, 2019

View PDF
Document ID
9791588721707202338
Author
Mohammed A
Publication year

External Links

Snippet

The Internet of Things (IoT) is a network of objects equipped with sensors, actuators, electronics, and connectivity protocols enabling object interaction without human intervention [6]. The IoT is involved in the creation of a variety of applications and services …
Continue reading at access.archive-ouverte.unige.ch (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks

Similar Documents

Publication Publication Date Title
Neshenko et al. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
Abdul-Ghani et al. A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
Jurcut et al. Introduction to IoT security
Miloslavskaya et al. Internet of Things: information security challenges and solutions
Abdul-Ghani et al. A comprehensive IoT attacks survey based on a building-blocked reference model
Jamali et al. Towards the internet of things
Hashemi et al. Internet of Things backdoors: Resource management issues, security challenges, and detection methods
Fan et al. Understanding security in smart city domains from the ANT-centric perspective
Ali et al. Cyber security for cyber physical systems
Bou-Harb et al. Cyber threat intelligence for the internet of things
Jabraeil Jamali et al. IoT security
Samaila et al. Security threats and possible countermeasures in IoT applications covering different industry domains
Salayma Risk and threat mitigation techniques in internet of things (IoT) environments: a survey
Wilson Inter-device authentication protocol for the internet of things
Mahmood et al. Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
Dhondge Lifecycle IoT Security for Engineers
Mena Blockchain-based security framework for the internet of things and home networks
Mohammed A reference model for securing IoT.
Garg et al. Anatomy of IoT Botnets and Detection Methods
Rull Aixa Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach
El Mahdi et al. Optimized scheme to secure IoT systems based on sharing secret in multipath protocol
Bou-Harb et al. Taxonomy of IoT vulnerabilities
Patil et al. A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics
TIAN A novel lightweight mqtt security scheme for the internet of medical things
Neshenko A Network Telescope Approach for Inferring and Characterizing IoT Exploitations