2021 IEEE 11th International Conference on Consumer Electronics (ICCE-Berlin) 2021
DOI: 10.1109/icce-berlin53567.2021.9719996
|View full text |Cite
|
Sign up to set email alerts
|

Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…SDP creates a virtual boundary through software and only allows access to authorized users and machines, effectively providing a "cloak of invisibility" for infrastructure and resources to prevent network attacks Moubayed et al 2019). The SDP framework consists of five security control layers: Single Packet Authentication (SPA), Mutual Transport Layer Security (mTLS), Device Validation (DV), Dynamic Firewall (DF), and Application Binding (AppB) (Singh et al 2020;Refaey et al 2019), which together provide mutual device authentication and confidential communication, validate user authenticity, ensure only authorized devices can access network resources, establish encrypted tunnels to secure service access, and defend against various network-based attacks (Palmo et al 2021), such as Denial of Service (DoS) attacks, manin-the-middle (MITM) attacks, tampering attacks, and sniffing attacks.…”
Section: Core Technology Of Zero Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…SDP creates a virtual boundary through software and only allows access to authorized users and machines, effectively providing a "cloak of invisibility" for infrastructure and resources to prevent network attacks Moubayed et al 2019). The SDP framework consists of five security control layers: Single Packet Authentication (SPA), Mutual Transport Layer Security (mTLS), Device Validation (DV), Dynamic Firewall (DF), and Application Binding (AppB) (Singh et al 2020;Refaey et al 2019), which together provide mutual device authentication and confidential communication, validate user authenticity, ensure only authorized devices can access network resources, establish encrypted tunnels to secure service access, and defend against various network-based attacks (Palmo et al 2021), such as Denial of Service (DoS) attacks, manin-the-middle (MITM) attacks, tampering attacks, and sniffing attacks.…”
Section: Core Technology Of Zero Trustmentioning
confidence: 99%
“…These models are based on multi-source heterogeneous data, including attributes of users and devices, behavioral patterns, application integrity, and flow baselines. Micro-segmentation is another technology that can be utilized to secure the IoT network against internal attacks resulting from lateral movement (Osman et al 2020).…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%