2019 IEEE/ACM 1st International Workshop on Software Engineering Research &Amp; Practices for the Internet of Things (SERP4IoT) 2019
DOI: 10.1109/serp4iot.2019.00010
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Multilayer Strategy against Attacks on IoT Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…For example, a two-pass scheme doubles the execution time of a one-pass scheme using the EtM approach. As a result, execution time is affected by the algorithm design, such that some two-pass schemes require more computations and dependencies (11)…”
Section: Criteria For Comparing Lae'smentioning
confidence: 99%
See 1 more Smart Citation
“…For example, a two-pass scheme doubles the execution time of a one-pass scheme using the EtM approach. As a result, execution time is affected by the algorithm design, such that some two-pass schemes require more computations and dependencies (11)…”
Section: Criteria For Comparing Lae'smentioning
confidence: 99%
“…While IoT provides ample opportunities for digital transformation, it poses significant security threats [9][10][11]. These threats include distributed denial of service attacks [10], botnets [12], privacy and confidentiality breaches [11], and IoT-targeted malware [13]. IoT data flows through the network and requires data encryption and authenticity to ensure confidentiality (C) and integrity (I).…”
Section: Introductionmentioning
confidence: 99%
“…(6) IoT-Flows based Monitor, Analyse, Plan, Execute, and Knowledge (MAPE-K) Junior et al in [43] proposed an IoT-Flows multilayer approach to IoT threats against attacks on an IoT environments using the Monitor, Analyse, Plan, Execute, and Knowledge method. This approach can be used to deal with widespread attacks at every layer of the network through systems that have defense system integration capabilities that act as a line of defense.…”
Section: Protocol Designs For Securitymentioning
confidence: 99%