2018
DOI: 10.1016/j.cose.2018.07.016
|View full text |Cite
|
Sign up to set email alerts
|

EclipseIoT: A secure and adaptive hub for the Internet of Things

Abstract: With the proliferation in the quantity and types of devices that may be included in an Internet of Things (IoT) ecosystem, particularly in the context of a smart home, it is essential to provide mechanisms to deal with the heterogeneity which such devices encompass. Variations can occur in data formats, frequency of operation, or type of communication protocols supported. The ability to support integration between sensors using a "hub" has become central to address many of these issues. The implementation of s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

3
7

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 20 publications
0
23
0
Order By: Relevance
“…As a result, it is not possible to employ complex and robust security measures. Additionally, given the diversity of these devices, it is very challenging to develop and deploy a security mechanism that can endure with the scale and range of devices [9].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, it is not possible to employ complex and robust security measures. Additionally, given the diversity of these devices, it is very challenging to develop and deploy a security mechanism that can endure with the scale and range of devices [9].…”
Section: Introductionmentioning
confidence: 99%
“…A very interesting idea was developed in EclipseIoT [22], which in addition to authentication and access control, features an early detection provision based on canary files. These are forged files with enticing names (e.g., "SmartLock.py") placed amongst genuine ones.…”
Section: B Behaviour-based Smart Home Idsmentioning
confidence: 99%
“…Also, Transport Layer Security (TLS), as used by [22] on 802.11 devices, is not an option for WSN devices given its constrained nature [23; 24]. Because of that, a security mechanism must be used to overcome this issue.…”
Section: A Problem Fundamentals and Contributionmentioning
confidence: 99%