2019
DOI: 10.1109/mc.2019.2917972
|View full text |Cite
|
Sign up to set email alerts
|

Network-Level Security for the Internet of Things: Opportunities and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…Additionally, the approach is complemented by a framework called MUDdy, which allows a formal semantic validation of MUD profiles and the compatibility check of MUD policies with the restrictions defined by an organization where the device is deployed. Furthermore, MUDgee is used by [36] and [37], which proposes an IoT device classification framework, and by [38], in which the generated MUD profiles are translated into flow rules. Moreover, [39] devices.…”
Section: A Mud Profiles Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the approach is complemented by a framework called MUDdy, which allows a formal semantic validation of MUD profiles and the compatibility check of MUD policies with the restrictions defined by an organization where the device is deployed. Furthermore, MUDgee is used by [36] and [37], which proposes an IoT device classification framework, and by [38], in which the generated MUD profiles are translated into flow rules. Moreover, [39] devices.…”
Section: A Mud Profiles Generationmentioning
confidence: 99%
“…Content may change prior to final publication. [33] (MUD Maker) [34] (MUDgee) [36] (MUDgee) [37] (MUDgee) [38] (MUDgee) [39] (MUDgee) [21] (MUD Maker) [40] (MUDgee) [41] (MUDgee) [20] (security testing results [55]) [44] (devices' changing behavior in smart buildings) [32] (MUD Maker) [19] (Medium-level Security Policy Language (MSPL) [45]) [47] (QoS parameters) [42] (MUDgee) [48] (human usage aspects) [49] (physical layer parameters and flow statistics) [52] (devices' fingerprinting data) [30] (MUD Maker) [42] (MUDgee) behavioral profiles for connected devices. These aspects are further discussed in Section V.…”
Section: A Mud Profiles Generationmentioning
confidence: 99%
“…One example of this is Shodan 1 , an online platform that enables users to access vulnerable security cameras connected to the Internet [Lin and Bergmann 2016]. Besides privacy, the exposure to cyber-physical systems can incur in physical harm, such as if a denial of service attack disables a smoke alarm during a fire [Habibi Gharakheili et al 2019], or an attacker maliciously controlling remotely a thermostat.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques are used to protect devices' data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices' communication before they join a certain network.Behavioral profiles can help to reduce the attack surface and mitigate security attacks by enforcing security policies as well as monitoring the device's expected behavior [16]. Traditionally, policy-based approaches have been used to specify the allowed/denied communications from/to a certain system.…”
mentioning
confidence: 99%
“…Behavioral profiles can help to reduce the attack surface and mitigate security attacks by enforcing security policies as well as monitoring the device's expected behavior [16]. Traditionally, policy-based approaches have been used to specify the allowed/denied communications from/to a certain system.…”
mentioning
confidence: 99%