2019 22nd International Conference on Control Systems and Computer Science (CSCS) 2019
DOI: 10.1109/cscs.2019.00033
|View full text |Cite
|
Sign up to set email alerts
|

Security-Oriented Framework for Internet of Things Smart-Home Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Furthermore, smart home applications are considered to benefit from zero trust as different devices on the network are used to communicate with cloud services. To ensure that services access is blocked from unauthorized nodes in the network, the user's smartphone can act as an SDP controller to mediate communications between the IoT and the cloud [29].To overcome the challenges associated with central authentication instances, Samaniego et al [30] proposed blockchain-based middleware that handled access authentication in a decentralized manner. In addition, the zero trust principle can also be used to transfer sensitive data.…”
Section: Zero Trust Securitymentioning
confidence: 99%
“…Furthermore, smart home applications are considered to benefit from zero trust as different devices on the network are used to communicate with cloud services. To ensure that services access is blocked from unauthorized nodes in the network, the user's smartphone can act as an SDP controller to mediate communications between the IoT and the cloud [29].To overcome the challenges associated with central authentication instances, Samaniego et al [30] proposed blockchain-based middleware that handled access authentication in a decentralized manner. In addition, the zero trust principle can also be used to transfer sensitive data.…”
Section: Zero Trust Securitymentioning
confidence: 99%
“…In addition, smart home applications are seen to benefit from zero trust as different devices on the network are used to communicate with cloud services. To ensure that access to services from unauthorized nodes in the network is blocked, the user's smartphone can act as an SDP controller, mediating communication between the IoT and the cloud [29]. To overcome the challenges associated with centralized authentication instances, Samaniego et al [30] propose blockchain-based middleware that handles access authentication in a decentralized manner.…”
Section: Zero Trust Securitymentioning
confidence: 99%
“…The platform architecture was also one of our research topics of [4][5][6], but, while our previous work was focused more on the design of the platform, the current effort is focused on implementing and analyzing the challenges of deploying the system in a real environment. Having a gateway-centric architecture, RESFIT ensures minimal resource consumption at the device layer and good response time in detecting malfunctions or malicious actions.…”
Section: Introductionmentioning
confidence: 99%