2015
DOI: 10.17487/rfc7452
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Considerations in Smart Object Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(40 citation statements)
references
References 11 publications
(15 reference statements)
0
39
0
1
Order By: Relevance
“…But in some cases the service provider may engage an external entity (company) for deeper security analysis, because security expertise level required in the analytics for detecting advanced threats can be beyond the capabilities of service providers. For such reasons, many companies are turning to [5]. This generalized model assumes that IoT devices upload data only to a single application service provider [6], however, users often want to be able to analyze data in combination with data from other sources.…”
Section: Contextmentioning
confidence: 99%
See 3 more Smart Citations
“…But in some cases the service provider may engage an external entity (company) for deeper security analysis, because security expertise level required in the analytics for detecting advanced threats can be beyond the capabilities of service providers. For such reasons, many companies are turning to [5]. This generalized model assumes that IoT devices upload data only to a single application service provider [6], however, users often want to be able to analyze data in combination with data from other sources.…”
Section: Contextmentioning
confidence: 99%
“…Completely another approach was adopted by originators of Dshield service. 5 They proposed centralized community-based firewall log correlation system which accepts logs from NIDS and firewalls around the Internet, aggregates them and then reports summaries on detected intrusions and possible attack activity. Information about detected attacks is available to network administrators in order to give them the ability to reconfigure and tune their security infrastructure.…”
Section: Intrusion Detection In Cloud Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…In March 2015, the Internet Architecture Board (IAB) released a guiding architectural document [9] for networking of smart objects, which outlines four common IoT communication models. Those models are depicted in Fig.…”
Section: B Iot Communication Modelsmentioning
confidence: 99%