[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Arshi et al., 2023 - Google Patents

Fortifying the Internet of Things: A Comprehensive Security Review

Arshi et al., 2023

View PDF
Document ID
1085452193134431713
Author
Arshi O
Chaudhary A
Publication year
Publication venue
EAI Endorsed Transactions on Internet of Things

External Links

Snippet

A variety of new technologies and their related capabilities have entered daily life in the long run of the IoT technology. Various industrial sectors, including healthcare, facility management, agriculture, energy, and transportation, use IoT technologies. Interconnected …
Continue reading at publications.eai.eu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Miloslavskaya et al. Internet of Things: information security challenges and solutions
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Kimani et al. Cyber security challenges for IoT-based smart grid networks
Nazir et al. Survey on wireless network security
Hossain et al. Towards an analysis of security issues, challenges, and open problems in the internet of things
Rao et al. A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Patwary et al. Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
Saba et al. Securing the IoT system of smart city against cyber threats using deep learning
Jabraeil Jamali et al. IoT security
Munir et al. Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks
Muzammal et al. A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology
Gupta et al. Security challenges in adopting internet of things for smart network
Poonia Internet of Things (IoT) security challenges
Valadares et al. Security challenges and recommendations in 5G-IoT scenarios
McGee Evaluating the cyber security in the internet of things: Smart home vulnerabilities
Wilson Inter-device authentication protocol for the internet of things
Miloslavskaya et al. Ensuring information security for internet of things
Anupriya et al. A survey on exploring the effectiveness of iot based home security systems
Shyvakov Developing a security framework for robots
Arshi et al. Fortifying the Internet of Things: A Comprehensive Security Review
Ahmadi et al. A survey on internet of things security issues and applications
Sahu et al. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance
Doghramachi et al. Iot threats and solutions with blockchain and context-aware security design: A review
Sniatala et al. Evolution of Smart Sensing Ecosystems with Tamper Evident Security
Tanque et al. Cyber risks on IoT platforms and zero trust solutions