2023
DOI: 10.1109/mce.2022.3207862
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…A ZT-based framework for the IC design process to counter insider threats is proposed in [14]. Palmo et al in [22] proposed a method to securely embed resource-limiting IoT devices within software-defined perimeter (SDP), a ZT model proposed by the cloud security alliance (CSA). The use of endogenous security concepts to improve the internal structure of the ZT security model is proposed in [23].…”
Section: Insider Threatsmentioning
confidence: 99%
“…A ZT-based framework for the IC design process to counter insider threats is proposed in [14]. Palmo et al in [22] proposed a method to securely embed resource-limiting IoT devices within software-defined perimeter (SDP), a ZT model proposed by the cloud security alliance (CSA). The use of endogenous security concepts to improve the internal structure of the ZT security model is proposed in [23].…”
Section: Insider Threatsmentioning
confidence: 99%
“…To use blockchain technology to achieve zero trust for IoT, researchers are also attempting to optimize existing ZTAs and zero trust technologies. Palmo et al [50] found that ensuring the reliability of IoT itself is critical when embedding IoT devices into SDPs. In this regard, they analysed the federation evaluation method of the IoT gateway, federation evaluation method of identity provider (IdP) and federation evaluation method of certification authority.…”
Section: Application Of Zero Trust In the Iot Environmentmentioning
confidence: 99%
“…The framework uses SDP to protect the security of the cloud and the inner layer of system by rejecting all unauthorized edge traffic. Y.-C. Palmo, et al [22] investigated and evaluated several federation methods to embed IoT devices into SDP and found that the identity provider (IdP) is the most effective methods. However, the IdP will costs lots of computing and storage resources to store the identity of the terminal.…”
Section: Related Workmentioning
confidence: 99%