Arshi et al., 2023 - Google Patents
Fortifying the Internet of Things: A Comprehensive Security ReviewArshi et al., 2023
View PDF- Document ID
- 1085452193134431713
- Author
- Arshi O
- Chaudhary A
- Publication year
- Publication venue
- EAI Endorsed Transactions on Internet of Things
External Links
Snippet
A variety of new technologies and their related capabilities have entered daily life in the long run of the IoT technology. Various industrial sectors, including healthcare, facility management, agriculture, energy, and transportation, use IoT technologies. Interconnected …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miloslavskaya et al. | Internet of Things: information security challenges and solutions | |
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Kimani et al. | Cyber security challenges for IoT-based smart grid networks | |
Nazir et al. | Survey on wireless network security | |
Hossain et al. | Towards an analysis of security issues, challenges, and open problems in the internet of things | |
Rao et al. | A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions | |
Patwary et al. | Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review | |
Saba et al. | Securing the IoT system of smart city against cyber threats using deep learning | |
Jabraeil Jamali et al. | IoT security | |
Munir et al. | Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks | |
Muzammal et al. | A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology | |
Gupta et al. | Security challenges in adopting internet of things for smart network | |
Poonia | Internet of Things (IoT) security challenges | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
McGee | Evaluating the cyber security in the internet of things: Smart home vulnerabilities | |
Wilson | Inter-device authentication protocol for the internet of things | |
Miloslavskaya et al. | Ensuring information security for internet of things | |
Anupriya et al. | A survey on exploring the effectiveness of iot based home security systems | |
Shyvakov | Developing a security framework for robots | |
Arshi et al. | Fortifying the Internet of Things: A Comprehensive Security Review | |
Ahmadi et al. | A survey on internet of things security issues and applications | |
Sahu et al. | Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance | |
Doghramachi et al. | Iot threats and solutions with blockchain and context-aware security design: A review | |
Sniatala et al. | Evolution of Smart Sensing Ecosystems with Tamper Evident Security | |
Tanque et al. | Cyber risks on IoT platforms and zero trust solutions |