Living in the Internet of Things: Cybersecurity of the IoT - 2018 2018
DOI: 10.1049/cp.2018.0010
|View full text |Cite
|
Sign up to set email alerts
|

Embedded Policing and Policy Enforcement Approach for Future Secure IoT Technologies

Abstract: The Internet of Things (IoT) holds great potential for productivity, quality control, supply chain efficiencies and overall business operations. However, with this broader connectivity, new vulnerabilities and attack vectors are being introduced, increasing opportunities for systems to be compromised by hackers and targeted attacks. These vulnerabilities pose severe threats to a myriad of IoT applications within areas such as manufacturing, healthcare, power and energy grids, transportation and commercial buil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…This paper aims to extend the policy driven approach presented by Tan et al [19], by presenting a policy-based security modelling design flow incorporating its output into the existing application threat modelling practises and design flow. In addition, this proposed approach compliments the work of Akatyev et al [20] and Siddiqui et al [21] by performing detailed threat modelling of a realistic connected car application scenario and proposing ways to enforce driven security policies using hardware and software approaches.…”
Section: Related-workmentioning
confidence: 67%
See 1 more Smart Citation
“…This paper aims to extend the policy driven approach presented by Tan et al [19], by presenting a policy-based security modelling design flow incorporating its output into the existing application threat modelling practises and design flow. In addition, this proposed approach compliments the work of Akatyev et al [20] and Siddiqui et al [21] by performing detailed threat modelling of a realistic connected car application scenario and proposing ways to enforce driven security policies using hardware and software approaches.…”
Section: Related-workmentioning
confidence: 67%
“…2) Hardware-based policy engine (HPE) architecture: Siddiqui et al have presented a hardware-based policy engine (HPE), a system architecture that checks the approved list of devices and either grants or restrict access to the device [21].…”
Section: B Policy Enforcement Approachmentioning
confidence: 99%
“…The concept of applying access control policy has further been explored within hardware. Siddiqui et al [22] detailed a pro-active, policy based hardware enforcement mechanism known as a Security Policy Engine. This hardware based approach offers independent monitoring of transactions on the system communication bus, providing an additional layer of security that can protect the device when, for example, software based protections have been bypassed or compromised.…”
Section: Additional Techniques and Methodologiesmentioning
confidence: 99%
“…A detailed SoC platform architecture [29], [30] and security modelling approach [31] that realises the proposed characteristics and embedded security requirements has been defined and implemented.…”
Section: B Architectural Components To Secure Next-generation Edge Tmentioning
confidence: 99%