2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC) 2019
DOI: 10.1109/dsc.2019.00058
|View full text |Cite
|
Sign up to set email alerts
|

Overview of IoT Security Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Additionally, the Open Web Application Security Project (OWASP) [39] identified attack vectors using the three layers of an IoT system: hardware, communication links, and interfaces/services layers. Thus, as shown in Figure 5 at all layers of the IoT architecture, implementation of IoT security mitigation techniques should include security architecture [40].…”
Section: Critical Analysis Of Iot Security 41 Threat Modelingmentioning
confidence: 99%
“…Additionally, the Open Web Application Security Project (OWASP) [39] identified attack vectors using the three layers of an IoT system: hardware, communication links, and interfaces/services layers. Thus, as shown in Figure 5 at all layers of the IoT architecture, implementation of IoT security mitigation techniques should include security architecture [40].…”
Section: Critical Analysis Of Iot Security 41 Threat Modelingmentioning
confidence: 99%
“…TCG defines trust by the predictability of entity behavior: An entity is trusted if its behavior always achieves the expected goal in the expected manner. Professor Zhang Huanguo of Wuhan University gave a popular explanation for credibility: credibility ≈ reliability+safety [9,10]. Academician Shen Changxiang innovatively proposed active immune trusted computing, which refers to the computer performing security protection while computing, ensuring that the logical combination for completing the computing task is not tampered with and destroyed, and that the entire process of computing is measurable, controllable, and not interfered with, making the computing results as expected [11].…”
Section: Multi Agent Trusted Interaction Architecturementioning
confidence: 99%