2016 2nd IEEE International Conference on Computer and Communications (ICCC) 2016
DOI: 10.1109/compcomm.2016.7924864
|View full text |Cite
|
Sign up to set email alerts
|

Security for the Internet of Things with Intelligent Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In 2018, the UK government issued the Code of Practice (CoP) for the Internet of Things security, according to which manufacturers should provide for the possibility of ensuring security at the stage of creating their products, and not eliminate the problems that arise exclusively on software update level. In the United States, the IOT Consumer TIPS Act of 2017, the SMART IoT Act of 2018 and the Internet of Things IoTCybersecurity Improvement Act of 2019 have been adopted (Hashemi et al, 2016).…”
Section: Resultsmentioning
confidence: 99%
“…In 2018, the UK government issued the Code of Practice (CoP) for the Internet of Things security, according to which manufacturers should provide for the possibility of ensuring security at the stage of creating their products, and not eliminate the problems that arise exclusively on software update level. In the United States, the IOT Consumer TIPS Act of 2017, the SMART IoT Act of 2018 and the Internet of Things IoTCybersecurity Improvement Act of 2019 have been adopted (Hashemi et al, 2016).…”
Section: Resultsmentioning
confidence: 99%
“…Theorem 3. Given a Moore-type FSM G and the dynamics of intrusion estimator with state observation (8). Then, the current state is opaque with state observation associated with S ⊆ X if and only if…”
Section: Opacity With State Observationmentioning
confidence: 99%
“…Note that in recent years, the real-time action flow of IoT systems can be realized and converted into the form of a finite state machine (FSM) by adopting data collector and analyzing transmission packets [6,7]. Then, FSM-based modeling approach to IoT systems have attracted a great deal of concern [8,9], and also provided a new tool and method for investigating the information security in this area.…”
Section: Introductionmentioning
confidence: 99%