Tulimiero, 2020 - Google Patents
An All-Round Secure IoT Network ArchitectureTulimiero, 2020
View PDF- Document ID
- 13738765146063956565
- Author
- Tulimiero A
- Publication year
External Links
Snippet
The adoption of the Internet of Things (IoT) is growing steadily and is increasingly becoming more and more widespread every day. As a consequence, we rely on IoT appliances to perform every kind of task: from turning on and off a light with a voice command, to remotely …
- 238000000034 method 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
- H04L41/0813—Changing of configuration
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cynthia et al. | Security protocols for IoT | |
| CN107534658B (en) | End-to-end authentication at the service layer using public key mechanisms | |
| US7774837B2 (en) | Securing network traffic by distributing policies in a hierarchy over secure tunnels | |
| US8104082B2 (en) | Virtual security interface | |
| Liyanage et al. | Securing the control channel of software-defined mobile networks | |
| Liyanage et al. | Enhancing security of software defined mobile networks | |
| Liyanage et al. | Secure communication channel architecture for software defined mobile networks | |
| Bhattacharjya et al. | Security challenges and concerns of Internet of Things (IoT) | |
| Basu et al. | Design challenges and security issues in the Internet of Things | |
| US20110113236A1 (en) | Methods, systems, and computer readable media for offloading internet protocol security (ipsec) processing using an ipsec proxy mechanism | |
| CN111726366A (en) | Device communication method, device, system, medium and electronic device | |
| Krishnan et al. | SDN enabled QoE and security framework for multimedia applications in 5G networks | |
| Grasa et al. | From Protecting protocols to layers: designing, implementing and experimenting with security policies in RINA | |
| Lei et al. | SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence | |
| Florea et al. | Challenges in security in Internet of Things | |
| Shashidhara et al. | SDN‐chain: Privacy‐preserving protocol for software defined networks using blockchain | |
| Saqib et al. | A systematized security and communication protocols stack review for Internet of Things | |
| El Jaouhari et al. | Sdn-based security management of multiple wot smart spaces | |
| Staudemeyer et al. | What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: A survey and lessons learned from the first implementation of DC-net | |
| Liyanage et al. | Secure hierarchical VPLS architecture for provider provisioned networks | |
| St Juste et al. | Tincan: User-defined p2p virtual network overlays for ad-hoc collaboration | |
| Park et al. | Survey for secure IoT group communication | |
| WO2024237976A1 (en) | A system for cryptographic agility with proxy task management | |
| Han et al. | Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks | |
| WO2019165235A1 (en) | Secure encrypted network tunnels using osi layer 2 protocol |