2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) 2018
DOI: 10.1109/wcncw.2018.8368997
|View full text |Cite
|
Sign up to set email alerts
|

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 26 publications
0
24
0
1
Order By: Relevance
“…Researchers have used the Cisco reference model in evaluating IoT security issues. In 2018, Bakhshi et al surveyed numerous publications referencing differing reference models and focused mainly on data ingestion and abstraction [15]. Peter Aufner reviews various threat frameworks in light of the Cisco model and concludes that gaps exist between the frameworks, IoT and security research [16].…”
Section: The Cisco Seven-layer Iot Reference Modelmentioning
confidence: 99%
“…Researchers have used the Cisco reference model in evaluating IoT security issues. In 2018, Bakhshi et al surveyed numerous publications referencing differing reference models and focused mainly on data ingestion and abstraction [15]. Peter Aufner reviews various threat frameworks in light of the Cisco model and concludes that gaps exist between the frameworks, IoT and security research [16].…”
Section: The Cisco Seven-layer Iot Reference Modelmentioning
confidence: 99%
“…From (5) and (8), the time complexity between TCN residual block and 1D convolutional structure is roughly comparable. Considering the input data are determinate after pre-processing and embedding space construction, the number of convolutional filters and the length of filter kernels is the main variable parameters in convolutional structure for time consumption.…”
Section: Time Complexitymentioning
confidence: 95%
“…As one of the most energetic technology companies, Microsoft has paid great enthusiasm into the IoT field, and Windows-based applications have been well-developed via their Azure IoT platform services [8]. Focused on the Windows-based malware invasion problem on the IoT platform, this article proposes a malware categorization scheme for attributing malware into different families through a Word2Vec-based temporal convolutional network (TCN).…”
Section: Introductionmentioning
confidence: 99%
“…Internet of things are system of interconnected computing devices and embedded devices using internet. The embedded devices connected with smart interfaces for their communication [1].The applications of IoT are smart homes, environment monitoring, health care systems, energy management, building automation and transportation [1].Internet of things (IOT) are used for Machine to Machine (M2M) communication in the industries or factories. This revolution in Industrial sector is Industry4.0.…”
mentioning
confidence: 99%