2020
DOI: 10.3390/s20071882
|View full text |Cite
|
Sign up to set email alerts
|

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems

Abstract: Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(30 citation statements)
references
References 38 publications
0
24
0
Order By: Relevance
“…In [40], Matheu et al addressed the Manufacturer's Use Description (MUD) model for network access control, data privacy, as well as channel and authorization protection policies. They then employed the SDN platform for efficiently accessing device data and resources, and also used the Blockchain technology to share data/information through Hyperledger 2 with the help of IoT devices.…”
Section: Iot With Sdnmentioning
confidence: 99%
“…In [40], Matheu et al addressed the Manufacturer's Use Description (MUD) model for network access control, data privacy, as well as channel and authorization protection policies. They then employed the SDN platform for efficiently accessing device data and resources, and also used the Blockchain technology to share data/information through Hyperledger 2 with the help of IoT devices.…”
Section: Iot With Sdnmentioning
confidence: 99%
“…In [16], Matheu et al effectively achieved the Manufacturer's Use Description (MUD) Model for Network Access Control, Data Privacy, and Channel and Authorization Protection Policies. Authors then provided SDN platforms for efficient access to device data and resources and also used Blockchain technology to share data through Hyperledger with the help of IoT devices.…”
Section: ) Sdn Based Iotmentioning
confidence: 99%
“…In [98], SDN controller is used to enforce security policies in IoT networks. The proposed system profiles the security of various devices based on their attributes.…”
Section: Security With Software Defined Architecturementioning
confidence: 99%
“…SDN has proved to be effective against various attacks such as DoS, DDoS, impersonation attacks [91]. Also, SDN has proven effective with other security challenges like node identification, authentication, node classification, and intrusion detection [86,89,90,[92][93][94][95][96][97][98][99]. Table 4 shows an overview of applicability of SDN in various security domains shown in literature.…”
Section: Challenges and Opportunities For Software Defined Network (Sdn)-based Security In Lpwanmentioning
confidence: 99%