2022
DOI: 10.1109/tdsc.2020.2997898
|View full text |Cite
|
Sign up to set email alerts
|

Verifying and Monitoring IoTs Network Behavior Using MUD Profiles

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
35
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(35 citation statements)
references
References 17 publications
0
35
0
Order By: Relevance
“…IoT devices with highly primitive security features are susceptible to attacks as they become entry points to infiltrate into critical infrastructures via the connected networks [38,41]. There is an escalation of new IoT threats and security risks, due to the inherent vulnerabilities in each of the four basic layers of the IoT architecture: In this section, we identify the potential risks and the key security requirements in each IoT layer from reported studies to form the key security requirements for our research problem [29,42,66,67]. We summaries our findings of IoT vulnerabilities and security risks in each layer of IoT architecture below.…”
Section: Security Requirements Of Iot Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…IoT devices with highly primitive security features are susceptible to attacks as they become entry points to infiltrate into critical infrastructures via the connected networks [38,41]. There is an escalation of new IoT threats and security risks, due to the inherent vulnerabilities in each of the four basic layers of the IoT architecture: In this section, we identify the potential risks and the key security requirements in each IoT layer from reported studies to form the key security requirements for our research problem [29,42,66,67]. We summaries our findings of IoT vulnerabilities and security risks in each layer of IoT architecture below.…”
Section: Security Requirements Of Iot Architecturementioning
confidence: 99%
“…Recent related works have studied the IoT security problem with the main focus of addressing the information leak of different IoT devices in smart environments, such as healthcare medical devices, home/office consumer devices, and educational toy devices [21,39,40]. Other categories of security studies have focused on anomaly detection by monitoring and fingerprinting IoT networks using machine learning techniques, and these solutions are resource-intensive and impractical for large-scale smart environments [41][42][43]. Further, research studies on secure smart environments are very much focused on specific application domains.…”
mentioning
confidence: 99%
“…Additionally, the authors develop a formal semantic framework to validate MUD files, as well as the compatibility with policies that can be defined in the scope of a certain organization. Based on this work, the same authors present an approach to monitor such profiles in [18]. The main objective of these proposals is to support the generation of MUD profiles to encourage the deployment of the standard.…”
Section: Related Workmentioning
confidence: 99%
“…The process required to obtain the generated MUD file is not considered. [18] Usage of the MUD to monitor suspicious behaviors. The obtaining and enforcement phases of the MUD files are not addressed.…”
Section: Reference General Descriptionmentioning
confidence: 99%
“…When the MUD file and observed behavior are inspected and compared, the user could be presented with a diagram highlighting where the observed behavior does not comply with the MUD file. The 844 UNSW researchers have developed a tool for comparing a provided MUD file with observed 845 activity [13]. One also could imagine the MUD Visualizer tool being extended to include this capability.…”
mentioning
confidence: 99%