2022 1st International Conference on 6G Networking (6GNet) 2022
DOI: 10.1109/6gnet54646.2022.9830354
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of Manufacturer Usage Description (MUD) on IoT Security

Abstract: With the growing number of IoT (Internet of Things) devices and their particular characteristics compared to traditional systems, incumbent security mechanisms need to be advanced for secure and resilient IoT operation in current ICT systems. One particular standard, which tries to improve IoT security in that regard, is the Manufacturer Usage Description (MUD) by IETF. In this paper, as our main focus is to highlight the security gains of using MUD, we first discuss the critical threats to IoT devices based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Additionally, we include the CPU, memory and network usage on the container level, collected by Google's cAdvisor 2 and on the node level, collected by the node-exporter 3 . All these metrics are collected and stored by Prometheus 4 , and later on requested by our algorithm.…”
Section: Metrics Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, we include the CPU, memory and network usage on the container level, collected by Google's cAdvisor 2 and on the node level, collected by the node-exporter 3 . All these metrics are collected and stored by Prometheus 4 , and later on requested by our algorithm.…”
Section: Metrics Collectionmentioning
confidence: 99%
“…This work proposes a Root Cause Analysis (RCA) scheme, namely IoMiRCA, running on top of a 5G infrastructure in a Kubernetes environment. We focus on a service architecture that includes Internet of Things (IoT) devices closely integrated into the network as typical in 5G and future network use cases [4] and leverage the extended MUD (Manufacturer Usage Description) le provided by a recent proposal called TRAILS [1]. The MUD standard essentially contains information about the allowed connection between domains and ports or further restrictions of the communication protocols [5].…”
mentioning
confidence: 99%