[go: up one dir, main page]

Tulimiero, 2020 - Google Patents

An All-Round Secure IoT Network Architecture

Tulimiero, 2020

View PDF
Document ID
13738765146063956565
Author
Tulimiero A
Publication year

External Links

Snippet

The adoption of the Internet of Things (IoT) is growing steadily and is increasingly becoming more and more widespread every day. As a consequence, we rely on IoT appliances to perform every kind of task: from turning on and off a light with a voice command, to remotely …
Continue reading at www.research-collection.ethz.ch (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements
    • H04L41/0813Changing of configuration

Similar Documents

Publication Publication Date Title
Cynthia et al. Security protocols for IoT
CN107534658B (en) End-to-end authentication at the service layer using public key mechanisms
US7774837B2 (en) Securing network traffic by distributing policies in a hierarchy over secure tunnels
US8104082B2 (en) Virtual security interface
Liyanage et al. Securing the control channel of software-defined mobile networks
Liyanage et al. Enhancing security of software defined mobile networks
Liyanage et al. Secure communication channel architecture for software defined mobile networks
Bhattacharjya et al. Security challenges and concerns of Internet of Things (IoT)
Basu et al. Design challenges and security issues in the Internet of Things
US20110113236A1 (en) Methods, systems, and computer readable media for offloading internet protocol security (ipsec) processing using an ipsec proxy mechanism
CN111726366A (en) Device communication method, device, system, medium and electronic device
Krishnan et al. SDN enabled QoE and security framework for multimedia applications in 5G networks
Grasa et al. From Protecting protocols to layers: designing, implementing and experimenting with security policies in RINA
Lei et al. SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
Florea et al. Challenges in security in Internet of Things
Shashidhara et al. SDN‐chain: Privacy‐preserving protocol for software defined networks using blockchain
Saqib et al. A systematized security and communication protocols stack review for Internet of Things
El Jaouhari et al. Sdn-based security management of multiple wot smart spaces
Staudemeyer et al. What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: A survey and lessons learned from the first implementation of DC-net
Liyanage et al. Secure hierarchical VPLS architecture for provider provisioned networks
St Juste et al. Tincan: User-defined p2p virtual network overlays for ad-hoc collaboration
Park et al. Survey for secure IoT group communication
WO2024237976A1 (en) A system for cryptographic agility with proxy task management
Han et al. Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks
WO2019165235A1 (en) Secure encrypted network tunnels using osi layer 2 protocol