2017 International Conference on Optimization of Electrical and Electronic Equipment (OPTIM) &Amp; 2017 Intl Aegean Conference 2017
DOI: 10.1109/optim.2017.7975101
|View full text |Cite
|
Sign up to set email alerts
|

Securing the IoT gateway based on the hardware implementation of a multi pattern search algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…an important strategy that needs to be kept in mind while installing the IoT devices [37]. Only the necessary interfaces and protocols should be implemented by an IoT gateway manufacturer.…”
Section: Extra Interfaces: Minimizing the Attack Surface Ismentioning
confidence: 99%
“…an important strategy that needs to be kept in mind while installing the IoT devices [37]. Only the necessary interfaces and protocols should be implemented by an IoT gateway manufacturer.…”
Section: Extra Interfaces: Minimizing the Attack Surface Ismentioning
confidence: 99%
“…(iii) Extra Interfaces: Installing IoT devices while keeping an eye on the attack surface is a critical technique [329]. IoT gateway manufacturers should only implement the protocols and interfaces that are strictly essential.…”
Section: Gateways and Its Securitymentioning
confidence: 99%
“…Minimizing the probability of attacks can be the only possible strategy in the security of IoT especially during the installation of new devices in the system [99]. If some of the services and functions are restricted for end-users, backdoor authentication and information breach can be reduced.…”
Section: ) Extra Interfacesmentioning
confidence: 99%