2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) 2017
DOI: 10.1109/aiccsa.2017.85
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Framework for Smart Water System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(35 citation statements)
references
References 21 publications
0
33
0
Order By: Relevance
“…Both scenarios will make use of the system's resources, methods, and data to initiate the attack. In this research, the security of an IoT application is considered with respect to the local and public networks [35]. Local networks include controllers and devices, communications and gateways, while public networks include IoT services and applications.…”
Section: B Identification Of Attack Surfacementioning
confidence: 99%
See 1 more Smart Citation
“…Both scenarios will make use of the system's resources, methods, and data to initiate the attack. In this research, the security of an IoT application is considered with respect to the local and public networks [35]. Local networks include controllers and devices, communications and gateways, while public networks include IoT services and applications.…”
Section: B Identification Of Attack Surfacementioning
confidence: 99%
“…1 an attack surface can be derived as shown in Table 1. This work focuses on the security of a Fog node (Gateway) implemented on a Raspberry Pi 3 configured to perform communications between other Fog nodes and IoT subsystems such as the Smart Water Testbed introduced in [35]. Fog nodes security is crucial to develop trustworthy IoT applications and services, providing resiliency and preventing cyber threats to be disseminated among other IoT subsystems.…”
Section: B Identification Of Attack Surfacementioning
confidence: 99%
“…They also showed the procedure to use the threat model in order to protect or secure gateway which is the necessary part of the communication gateway. The functionality of this method is based on the concept that it utilizes a profile that is developed to accurately and characterizes the normal operations of gateway [9]. As per analysis, it is demonstrated that proposed approach of ABAIDS can detect both known and unknown attacks with high detection rates and low false positive alarms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The smart water applications include water pipeline monitoring, water quality in open water source, smart water meter reading, IoT security for smart water system(SWS) etc. In order to ensure the integrity of customer information, security of the devices and data passed through the network, a framework and methodology were developed [37]. Water quality monitoring of open water sources was another application that was implemented using IoT devices.…”
Section: A Smart Water Systemmentioning
confidence: 99%