2019
DOI: 10.3390/app9214576
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things

Abstract: The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products. Despite the well-known advantages for the industry, an increasingly pervasive industrial ecosystem could make such devices an attractive target for potential attackers. Recently, the Manufacturer Usage Description (MUD) standard enables manufacturers to specify the intended use of their devices, thereby restricting the attack surface o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(27 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…On the right, we show the architecture components required for enabling a secure data sharing process based on the extended MUD profiles, after the device has completed the bootstrapping process. Our approach extends the architecture proposed by Matheu et al [10], in which the MUD architecture was integrated in the bootstrapping phase. In this phase, we obtain the device's information required to protect the device before it joins the network.…”
Section: Architecturementioning
confidence: 94%
See 4 more Smart Citations
“…On the right, we show the architecture components required for enabling a secure data sharing process based on the extended MUD profiles, after the device has completed the bootstrapping process. Our approach extends the architecture proposed by Matheu et al [10], in which the MUD architecture was integrated in the bootstrapping phase. In this phase, we obtain the device's information required to protect the device before it joins the network.…”
Section: Architecturementioning
confidence: 94%
“…As mentioned above, Figure 1 shows an overview of the main processes involved in our proposal that will be further detailed in Section 6. For the Device Authentication (Step 1) and MUD Obtaining (Step 2) phases, we use a similar approach to the one proposed by Matheu et al [10], which is based on a combination of the Extensible Authentication Protocol (EAP) [42] and the Authentication, Authorization and Accounting (AAA) Framework [43]. Instead of using the Protocol for Carrying Authentication for Network Access (PANA) [44], we employ the Constrained Application Protocol (CoAP) standard as an EAP lower layer specifically designed for devices with constrained memory and computational resources [15].…”
Section: Architecturementioning
confidence: 99%
See 3 more Smart Citations