2014
DOI: 10.3390/s141224188
|View full text |Cite
|
Sign up to set email alerts
|

A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

Abstract: With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 100 publications
(46 citation statements)
references
References 27 publications
0
42
0
Order By: Relevance
“…However, the attack pattern in the database should be updated over a period but is not illustrated in the paper. In [14], an attack pattern matching engine, with auxiliary shifting and early decision, is incorporated for better performance of constrained devices in IoT. The auxiliary shifting method avoids the matching operations to increase the computation efficiency.…”
Section: Signature-based Idsmentioning
confidence: 99%
“…However, the attack pattern in the database should be updated over a period but is not illustrated in the paper. In [14], an attack pattern matching engine, with auxiliary shifting and early decision, is incorporated for better performance of constrained devices in IoT. The auxiliary shifting method avoids the matching operations to increase the computation efficiency.…”
Section: Signature-based Idsmentioning
confidence: 99%
“…Oh et al [102] proposed a lightweight maliciouspattern-matching IDS. They stressed that traditional IDSs are not applicable for smart objects due to the limited memory size and battery life of these objects.…”
Section: Idss Designed For Iot Systemsmentioning
confidence: 99%
“…With the development of IoT applications, security remains the most important issue that cannot be ignored because of the connectivity and the sensitivity of the collected data. Also, the IoT has many restrictions and limitations in terms of components and devices such as limited processing capacity, memory, and power consumption, and even the heterogonous and the ubiquitous nature of IoT that introduce additional concerns [13]. The implementation of a security policy around these systems is therefore essential.…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%