2022
DOI: 10.1109/tii.2021.3084341
|View full text |Cite
|
Sign up to set email alerts
|

Software-Defined Security-by-Contract for Blockchain-Enabled MUD-Aware Industrial IoT Edge Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The identification of connected objects poses a great challenge given a large number of heterogeneous protocols [12], the networks used and few consensual standards. Recent approaches to object identification based on behavioral analysis of computing devices have emerged [13]. The basic idea is to scrutinize the traffic crossing the network, using either active or passive measurement techniques, and to extract unique patterns that are sufficiently discriminating in order to individually identify the objects present within our network.…”
Section: Introductionmentioning
confidence: 99%
“…The identification of connected objects poses a great challenge given a large number of heterogeneous protocols [12], the networks used and few consensual standards. Recent approaches to object identification based on behavioral analysis of computing devices have emerged [13]. The basic idea is to scrutinize the traffic crossing the network, using either active or passive measurement techniques, and to extract unique patterns that are sufficiently discriminating in order to individually identify the objects present within our network.…”
Section: Introductionmentioning
confidence: 99%
“…SDN innovatively changes the existing network structure by dividing it into a data plane and a control plane [2], making it possible to optimize network resource allocation and improve network quality. However, the open and untrustworthy network environment of SDN leaves it vulnerable to attackers who may use forged user identities or malicious terminals to attack the network [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…As distributed networks are gaining popularity, efforts are being made by researchers to adopt Blockchain Technology for securing SDN-enabled networks. Blockchain is a Distributed Ledger Technology (DLT) with characteristics such as decentralization, immutability, non-reversibility, and peer-to-peer operation and has been widely adopted in various fields Krishnan et al (2022); Wang et al (2022); Roy et al (2021); Misra et al (2020a). Blockchain has been effectively used in the field of IoT to preserve the privacy of IoT devices and data-sharing schemes Ferrag et al (2019).…”
Section: Introductionmentioning
confidence: 99%