منابع مشابه
Securing Real-Time Internet-of-Things
Todays embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). The current trend is to connect real-time embedded devices to the Internet. This gives rise to the real-time Internet-ofthings (RT-IoT) that promises a better ...
متن کاملSecuring Internet of Things with Lightweight IPsec
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IP...
متن کاملIDIoT: Securing the Internet of Things like it's 1994
Over 20 billion Internet of Things devices are set to come online by 2020. Protecting such a large number of underpowered, UI-less, network-connected devices will require a new security paradigm. We argue that solutions dependent on vendor cooperation such as secure coding and platform changes are unlikely to provide adequate defenses for the majority of devices. Similarly, regulation approache...
متن کاملSecuring the Internet of Things: A Machine Learning Approach
The Internet of Things, IoT, is expected to revolutionize our lives, and their security of paramount importance. Machine learning, on the other hand, has found many applications in computer security in general, and IoT security in particular. In this tutorial, we review the state-of-the-art on machine learning applications for end-to-end Internet of Things systems security, by touching upon sec...
متن کاملPoster: Securing the Internet of Things with DTLS
Usecases for wireless sensor networks, such as building automation or patient care, often collect and transmit sensitive information. Yet, many deployments currently do not protect this data through suitable security schemes. We propose an end-to-end security scheme build upon existing internet standards, specifically the Datagram Transport Layer Security protocol (DTLS). By relying on an estab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer
سال: 2011
ISSN: 0018-9162
DOI: 10.1109/mc.2011.291