2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2016
DOI: 10.1109/icitst.2016.7856708
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating IoT security threats with a trusted Network element

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…Moreover, all the solutions analysed in Table 27 require an additional node/server/gateway that perform verification operations. Kuusijärvi et al [35] and our solution have a small benefit over the others: The gateway is not a dedicated node, unlike the MUD controller used by MUD-based solutions, for example. This reduces costs and network complexity to a certain extent.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, all the solutions analysed in Table 27 require an additional node/server/gateway that perform verification operations. Kuusijärvi et al [35] and our solution have a small benefit over the others: The gateway is not a dedicated node, unlike the MUD controller used by MUD-based solutions, for example. This reduces costs and network complexity to a certain extent.…”
Section: Related Workmentioning
confidence: 99%
“…Kuusijärvi et al [35] proposed to strengthen IoT security through a network edge device (NED), a secure device that stores the user-defined policies and enforces them on resource-constraint IoT devices. However, this kind of approach fails to identify specific requirements of the devices (i.e., they do not envision anything like a contract), offloading to the end-user the cumbersome task of defining fine-grained policies.…”
Section: Related Workmentioning
confidence: 99%
“…When viewing DERs from the IoT perspective, most of the security implications and attack mitigation strategies applicable for IoT end-devices could be exercised. In [131], the authors suggest the use of a personal security application (PSA) as a countermeasure for IoT-related attacks. PSA resembles a combination of security features, such as access control mechanisms, malware detection, network traffic, and resource utilization monitoring, etc., to strengthen the security posture of IoT devices and networks.…”
Section: B Der Device Levelmentioning
confidence: 99%
“…Attacks Reference Network connection auditing using authentication, authorization, and accounting servers, role-based access control, authentication-based MAC address white-listing, unused port hardening MAC Spoofing, MAC Flooding, DoS, MitM, SYN flooding [34], [38] IP header (Sequence number) inclusion in TCP, cryptographically enhanced address resolution protocols (ARP), secure key distribution and exchange schemes Packet Replay, DoS, MitM, SYN flooding [43], [38] Firewalls, intrusion detection/prevention systems (ID/IPS), traceback and push-back services, cryptographic hashing and stack tweaking Mac Flooding, DoS, MitM, SYN flooding [43], [44], [34] Password management systems, access restriction after multiple failed log-in attempts, hardened operating system kernels, roll-back firmware updates Brute force attacks, DoS, Packet Replay, Eavesdropping [125] Personal security and privacy practises (e.g., security updates, password managers, encryption, ephemeral keys, etc.) Packet Replay, Eavesdropping [131] standardization and policy-making procedures can strengthen the cybersecurity posture of DERs and prevent vulnerabilities from materializing into treats and attacks. However, if the discussed practices fail to prevent or detect DER attacks, risk metrics, detailed system modeling, and mitigation plans can orchestrate available resources to inhibit or overcome undesirable grid conditions, thus enhancing EPS resilience.…”
Section: Mitigationsmentioning
confidence: 99%
“…Kuusijärvi et al [15] proposed to strengthen IoT security through a network edge device (NED), a secure device which stores the user-defined policies and enforces them on resource-constraint IoT devices. However, this kind of approach fails to identify specific requirements of the devices (i.e., they do not envision anything like a contract), offloading on the end-user the cumbersome task of defining fine-grained policies.…”
Section: Related Workmentioning
confidence: 99%