Yousuf et al., 2015 - Google Patents
Internet of Things (IoT) security: Current status, challenges and countermeasuresYousuf et al., 2015
View PDF- Document ID
- 10391227143924963398
- Author
- Yousuf T
- Mahmoud R
- Aloul F
- Zualkernan I
- Publication year
- Publication venue
- International Journal for Information Security Research (IJISR)
External Links
Snippet
This paper presents a survey and an analysis of the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything, anywhere. As opposed to the traditional Internet, in addition to humans, an IoT connects a …
- 238000004458 analytical method 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yousuf et al. | Internet of Things (IoT) security: Current status, challenges and countermeasures | |
Mahmoud et al. | Internet of things (IoT) security: Current status, challenges and prospective measures | |
Gebremichael et al. | Security and privacy in the industrial internet of things: Current standards and future challenges | |
Lu et al. | Internet of Things (IoT) cybersecurity research: A review of current research topics | |
Mendez et al. | Internet of things: Survey on security and privacy | |
Šarac et al. | Increasing privacy and security by integrating a blockchain secure interface into an IoT device security gateway architecture | |
Oh et al. | Security requirements analysis for the IoT | |
Hossain et al. | Towards an analysis of security issues, challenges, and open problems in the internet of things | |
Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
Rauf et al. | Security and privacy for IoT and fog computing paradigm | |
Özalp et al. | Layer-based examination of cyber-attacks in IoT | |
Hossain et al. | Securing the internet of things: A meta-study of challenges, approaches, and open problems | |
Jabraeil Jamali et al. | IoT security | |
Khan et al. | Understanding security requirements and challenges in internet of things (IoTs): A review | |
Mahalle et al. | Identity driven capability based access control (ICAC) scheme for the Internet of Things | |
Badr et al. | Security and privacy in the Internet of Things: threats and challenges | |
Quadar et al. | Cybersecurity issues of IoT in ambient intelligence (AmI) environment | |
Sudha et al. | A review on privacy requirements and application layer security in Internet of Things (IoT) | |
Khalid et al. | Study of security and privacy issues in internet of things | |
Poonia | Internet of Things (IoT) security challenges | |
Ntayagabiri et al. | A Comprehensive Approach to Protocols and Security in Internet of Things Technology | |
Millar | IoT security challenges and mitigations: An introduction | |
Khanam | Review of threats in IoT systems: challenges and solutions | |
Desai et al. | Security and privacy issues in fog computing for healthcare 4.0 | |
Ezema et al. | Open issues and security challenges of data communication channels in distributed Internet of Things (IoT): a survey |