Filters








47,011 Hits in 3.6 sec

A survey for Communication security of the embedded system

Yu Xie, Attila Buchman
2021 Carpathian Journal of Electronic and Computer Engineering  
The important reason for these attacks is that embedded systems lack sufficient multi-layer protection mechanisms.  ...  Then analyze the existing communication security-related technologies from the perspectives of the network layer, the transport layer, and the application layer.  ...  The important reason for these attacks is that embedded systems lack sufficient multi-layer protection mechanisms.  ... 
doi:10.2478/cjece-2021-0009 fatcat:mae7pveoqvaz7mcucqewv6cp7e

Editorial: Special issue on security and privacy in network computing

Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang
2019 World wide web (Bussum)  
Therefore, securing network computing is urgent and challenging, calling for non-trivial collective efforts from multiple parties, including  ...  On the other hand, the diversity and the unique characteristics of network computing paradigms make a silver bullet for the general solution difficult to seek.  ...  in Network Computing".  ... 
doi:10.1007/s11280-019-00704-x fatcat:vj64c2lpgzherhpsiqgjzjtzla

A General Distributed Architecture for Resilient Monitoring over Heterogeneous Networks [chapter]

Fábio Januário, Alberto Cardoso, Paulo Gil
2014 IFIP Advances in Information and Communication Technology  
The growing developments on networked devices, with different communication structures and capabilities made possible the emergence of new architectures for monitoring systems.  ...  In the case of heterogeneous distributed environments, where knowledge, processing devices, sensors and actuators are distributed throughout the network, the design of such systems are challenging in terms  ...  The present work proposes a general architecture for resilient monitoring over heterogeneous networks making use of multi-agents embedded on a distributed middleware framework, where each agent is tailored  ... 
doi:10.1007/978-3-642-54734-8_15 fatcat:hhqxpujfxfd73fp46mcjb2n2le

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems [chapter]

Konstantinos Fysarakis, George Hatzivasilis, Ioannis Askoxylakis, Charalampos Manifavas
2015 Lecture Notes in Computer Science  
The reasoning process is modeled as an agent's behavior and applied on an epistemic multi-agent reasoner for ambient intelligence applications.  ...  Agents monitor distinct embedded systems and are deployed as OSGi bundles to enhance the real-time management of embedded devices.  ...  These layers, from bottomup, are: Node (represents all the embedded devices themselves), Network (consists of nodes connected in networks), Middleware (the management-software of the networks) and Overlay  ... 
doi:10.1007/978-3-319-20376-8_55 fatcat:2z64vb63r5furiloc465ebwf6u

Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet of Things [chapter]

Jung Tae (Steve) Kim
2022 IoT Applications Computing  
In this chapter, we analyzed security challenges and threats based on smart home network under IoT service.  ...  Many different types of object and devices are embedded in sensor node. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium.  ...  It includes IoT security controls, optimized mechanisms for the new skills and extremely complex embedded applications. Example of IoT based on smart home network topology is shown in Figure 8 .  ... 
doi:10.5772/intechopen.97851 fatcat:6bkcdwr7z5hqfglpdcem7f2opu

An access control management protocol for Internet of Things devices

Mark Taylor, Denis Reilly, Brett Lempereur
2017 Network Security  
, verification of geo-location of the mobile device used to control the IoT device, safe operation controls, and exception reporting as a means of providing a tiered security approach for such devices.  ...  The access control management protocol for Internet of things devices examined in this paper involves the use of physical proximity 'registration' for remote control of such devices, encryption of communications  ...  , that is the physical device layer, the network layer, and the application layer.  ... 
doi:10.1016/s1353-4858(17)30071-5 fatcat:dwlsfiu3ofbsfivdu2fowr25zi

The MILS architecture for high-assurance embedded systems

Jim Alves Foss, Paul W. Oman, Carol Taylor, W. Scott Harrison
2006 International Journal of Embedded Systems  
This paper provides an overview of the Multiple Independent Levels of Security and Safety (MILS) approach to high-assurance system design for security and safety critical embedded systems.  ...  MILS is particularly well suited to embedded systems that must provide guaranteed safety or security properties.  ...  This layer provides only a few base security mechanisms, following the recommendations of Saltzer and Schroeder [22] for economy of mechanism, keeping security mechanisms as simple as possible.  ... 
doi:10.1504/ijes.2006.014859 fatcat:f5vn6yhptnb4xhuznyrawamyu4

Security Challenges and Countermeasures for the Heterogeneity of IoT Applications

Deepak Choudhary
2019 Journal of Autonomous Intelligence  
New security issues arise through the heterogeneity of IoT applications and devices and their large-scale deployment.  ...  As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems.  ...  -that is the physical device layer, the network layer and the application layer.  ... 
doi:10.32629/jai.v1i2.25 fatcat:bmulirysnvemnn5lizjfxfkmbu

Design and Implementation of A Network Security Management System [article]

Zhiyong Shan, Bin Liao
2016 arXiv   pre-print
The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).  ...  First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism and emergency response mechanism; at last, describes  ...  View mapping mechanism Assembling algorithm: Parameter: device tree's embedding structure 1) call algorithm of building tree to transform device tree's embedding structure to a subtree preparing for assembling  ... 
arXiv:1609.00099v2 fatcat:rmewwa7a5bb4na4kb2wcaatf4e

Analyses and Security Requirements for Smart Home Network Based on Internet of Things

Jung Tae Kim
2016 International Journal of Reliable Information and Assurance  
The characteristics of IoT have a wideband of network, connection of heterogeneous devices and network and make it possible to service a lot of application.  ...  We analyzed the requirement of security condition in the case of integrating infrastructure and architecture of layers in IoT application.  ...  To apply enhanced security, constrained devices with embedded security engines requires optimal security mechanisms.  ... 
doi:10.21742/ijria.2016.4.2.05 fatcat:avq6yfvf75emvfuhuzwn2p4xzy

An SMS-SQL based On-board system to manage and query a database

Ahmed Sbaa, Rachid El, Hicham Medromi
2012 International Journal of Advanced Computer Science and Applications  
Following an innovative idea, this paper describes an embedded system that can query any database through SMS commands to extend the consultation of data to mobile networks early generations.  ...  Thanks to them, electronic devices are increasingly present in our lives in many forms: Mobile phones, music players and managers have become the essential of modern life.  ...  In the upper layers there are libraries for access to the GSM device for sending and receiving SMS queries. There are also drivers for querying various databases to consult.  ... 
doi:10.14569/ijacsa.2012.030622 fatcat:gq55rk55y5bgdphwnqvhaoyn6u

Security trends in Internet of Things: a survey

Rachit, Shobha Bhatt, Prakash Rao Ragiri
2021 SN Applied Sciences  
AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states.  ...  The research outcomes can benefit the research community in IoT by integrating IoT-based devices' best security aspects.  ...  Layered architecture Internet of Things has a multi-layer and multi-plane architecture, as shown in Fig. 2 .  ... 
doi:10.1007/s42452-021-04156-9 fatcat:46srogfggjhndgeuy6lqyllsxq

Requirement of Security for IoT Application based on Gateway System

Jung Tae Kim
2015 International Journal of Security and Its Applications  
An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security  ...  mechanism used in each one of these networks.  ...  Therefore mechanisms such as secure socket layer or TLS (Transport Layer Security) are added on the original TCP/IP protocol used in the Internet [3] .  ... 
doi:10.14257/ijsia.2015.9.10.18 fatcat:osncf5ajwjgtdawwomxs2mjooe

A Trusted Architecture for ESCS with MLS

Xia Yang, Xiangyu Zhao, Jian Lei, Guangze Xiong
2008 2008 International Conference on Embedded Software and Systems Symposia  
The proposed framework supports multi-levels security (MLS), based on the principle of creating separate layers of responsibility and control, with each layer responsible for enforcing its own security  ...  Past attempts at designing and implementing high trusted systems for embedded safety-critical systems (ESCS) have centered on the concept of a monolithic security kernel and safety kernel.  ...  As opposed to the past works, in this paper we propose a multi-layered architecture named Hades for embedded trustworthy systems that is currently being used in the implementation of embedded real-time  ... 
doi:10.1109/icess.symposia.2008.66 fatcat:rtcc4jfgzncnlpbja6uc2b2sqm

A survey of security and privacy issues in the Internet of Things from the layered context [article]

Samundra Deep, Xi Zheng, Alireza Jolfaei, Dongjin Yu, Pouya Ostovari, Ali Kashif Bashir
2020 arXiv   pre-print
security solutions to safeguard the IoT from the layered context.  ...  Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these  ...  Multi-party authentication for the resource constrained devices and securely data storing in the cloud are some of the prime concerns in this layer ? .  ... 
arXiv:1903.00846v2 fatcat:jfwwbyw2cfaozk3uygz3ulc22a
« Previous Showing results 1 — 15 out of 47,011 results