NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406189
|View full text |Cite
|
Sign up to set email alerts
|

Securing IoT microservices with certificates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 8 publications
0
14
0
2
Order By: Relevance
“…External attacks often aim at acquiring the same rights than the ones of authorized internal users. In order to avoid these attacks, the system typically relies on authentication methods based on cryptographic techniques [15]. Internal attacks may be more difficult to counter, and require behavioral patterns to be built, in order to detect deviations that characterize potential security attacks afterwards.…”
Section: Related Workmentioning
confidence: 99%
“…External attacks often aim at acquiring the same rights than the ones of authorized internal users. In order to avoid these attacks, the system typically relies on authentication methods based on cryptographic techniques [15]. Internal attacks may be more difficult to counter, and require behavioral patterns to be built, in order to detect deviations that characterize potential security attacks afterwards.…”
Section: Related Workmentioning
confidence: 99%
“…Pahl and Donini [24] proposed the use of public key certificates for authenticating IoT devices in order to strengthen DTLS services. Hewa et al [25] applied Elliptic Curve Qu-Vanstone (ECQV) certificates in IoT scenarios and used the blockchain-based smart contracts to manage the certificates.…”
Section: Related Workmentioning
confidence: 99%
“…External attacks often aim at acquiring the same rights than the ones of authorized internal users. In order to avoid these attacks, the system typically relies on authentication methods based on cryptographic techniques [11]. Internal attacks may be more difficult to counter, and require behavioral patterns to be built, in order to detect deviations that characterize potential security attacks afterwards.…”
Section: Related Workmentioning
confidence: 99%