Wu, 2021 - Google Patents
A comprehensive set of security measures for IOTWu, 2021
- Document ID
- 7547193384641638345
- Author
- Wu C
- Publication year
- Publication venue
- Internet of Things Security: Architectures and Security Measures
External Links
Snippet
By scrutinizing minor differences between different security requirements, this chapter presents a set of security measures for IoT. The proposed set of security measures categorizes security requirements in different aspects, including physical security, execution …
- 238000010998 test method 0 description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10542002B2 (en) | Systems and methods for device authentication | |
Ahemd et al. | IoT security: A layered approach for attacks & defenses | |
Islam et al. | An analysis of cybersecurity attacks against internet of things and security solutions | |
Andrea et al. | Internet of Things: Security vulnerabilities and challenges | |
US9356940B2 (en) | Security and access system based on multi-dimensional location characteristics | |
Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
US10263782B2 (en) | Soft-token authentication system | |
KR20190048587A (en) | METHOD FOR SECURITING REMOTELY INTERNET OF THINGS(IoT) AND APPARATUS USING THE SAME | |
Chhetri et al. | Identifying vulnerabilities in security and privacy of smart home devices | |
Mbarek et al. | Trust-based authentication for smart home systems | |
Fröhlich et al. | A secure IIoT gateway architecture based on trusted execution environments | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
Sehgal et al. | Cloud computing and information security | |
Wood et al. | Security of distributed, ubiquitous, and embedded computing platforms | |
Rani et al. | Classification of security issues and cyber attacks in layered internet of things | |
Wu | A comprehensive set of security measures for IOT | |
Fathalla et al. | Towards a Lightweight Self-Sovereign Identity Framework for IoT Network in a zero trust Environment | |
Wu | IoT Perception Layer Security | |
Sun et al. | DNA-X: Dynamic network authentication using SGX | |
Vemuri et al. | Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption | |
Shoba Bindu et al. | Security in ubiquitous computing environment: Vulnerabilities, attacks and defenses | |
JP2005151004A (en) | Wireless tag privacy protection method, wireless tag device, security server device, wireless tag device program, and security server device program | |
Shree et al. | Understanding the limitations of authentication protocols employed by existing information security models for networked applications | |
US11811915B1 (en) | Stateless system to protect data | |
Zahra et al. | Security Issues in Internet of Things (IoT): Challenges and Solutions |