2017 28th Irish Signals and Systems Conference (ISSC) 2017
DOI: 10.1109/issc.2017.7983645
|View full text |Cite
|
Sign up to set email alerts
|

Digital certificate-based port knocking for connected embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
3
0
3
Order By: Relevance
“…With the increase in attacks on IoT devices, the focus has turned towards the port knocking feature and finding the kind of algorithms that can be used in the Internet of Things environment. Due to the popularity of IoT, a lot of research has been directed towards IoT threats, vulnerabilities, attacks, limitations, authentication, and challenges [4], [5], [6], [14], [15], [21]. Many researchers have also examined the security of IoT and possible countermeasures.…”
Section: Related Workmentioning
confidence: 99%
“…With the increase in attacks on IoT devices, the focus has turned towards the port knocking feature and finding the kind of algorithms that can be used in the Internet of Things environment. Due to the popularity of IoT, a lot of research has been directed towards IoT threats, vulnerabilities, attacks, limitations, authentication, and challenges [4], [5], [6], [14], [15], [21]. Many researchers have also examined the security of IoT and possible countermeasures.…”
Section: Related Workmentioning
confidence: 99%
“…UDP was chosen as the transport protocol for sending the values, as TCP connection-based overhead and interactivity were not deemed necessary nor applicable, respectively, to minimalist design goals. ICMP traffic could be an alternative, though nothing was found in the literature to support this approach, whereas [12], [47], [48] provide justifications for choosing UDP. Python's native socket library was used to send the knock packet, where the server IP and destination port values are both taken from the client profile, the former being user input from stdin, and the latter being randomly generated.…”
Section: Client Actionsmentioning
confidence: 99%
“…Ada beberapa penelitian sebelumnya yang membahas terkait keamanan jaringan, yakni penelitian yang dilakukan oleh Basim Mahbooba, et al [5], yang membahas penguncian port berbasis sertifikat digital untuk menghubungkan sistem yang embedded pada IoT.…”
Section: Penelitian Terkaitunclassified