logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Security Architecture For Defining And Enforcing Security Profiles In Dltsdnbased Iot Systems Sara N Matheu Garcia

  • SKU: BELL-10776508
Security Architecture For Defining And Enforcing Security Profiles In Dltsdnbased Iot Systems Sara N Matheu Garcia
$ 31.00 $ 45.00 (-31%)

4.1

60 reviews

Security Architecture For Defining And Enforcing Security Profiles In Dltsdnbased Iot Systems Sara N Matheu Garcia instant download after payment.

Publisher: MDPI
File Extension: PDF
File size: 2.5 MB
Pages: 33
Author: Sara N. Matheu Garcia, Alberto Robles Enciso, Alejandro Molina Zarca
Language: English
Year: 2020

Product desciption

Security Architecture For Defining And Enforcing Security Profiles In Dltsdnbased Iot Systems Sara N Matheu Garcia by Sara N. Matheu Garcia, Alberto Robles Enciso, Alejandro Molina Zarca instant download after payment.

Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network.

Related Products