Nothing Special   »   [go: up one dir, main page]

Meijer et al., 2022 - Google Patents

Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation

Meijer et al., 2022

View PDF
Document ID
10470046078871791805
Author
Meijer M
Petrucci G
Schotsman M
Zangrandi L
Van Ede T
Continella A
Gankhuyag G
Allodi L
Sciancalepore S
Publication year
Publication venue
2022 IEEE 8th World Forum on Internet of Things (WF-IoT)

External Links

Snippet

This paper introduces the Federated Lab (in short, FedLab), a virtual platform enabling shared research and experimentation on Internet of Things (IoT) devices, protocols, and functionalities in a network of geographically-distributed peers. In a nutshell, the FedLab …
Continue reading at research.utwente.nl (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
US11218376B2 (en) Algorithmic problem identification and resolution in fabric networks by software defined operations, administration, and maintenance
Bhat et al. Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities
Cox et al. Advancing software-defined networks: A survey
Bajpai et al. A survey on internet performance measurement platforms and related standardization efforts
Arzo et al. A theoretical discussion and survey of network automation for IoT: Challenges and opportunity
CN115918139A (en) Active assurance of network slicing
US10764127B2 (en) Techniques for virtualized network capacity management
CN113016167A (en) Method and device for enabling right to follow terminal equipment in network
JP2017534109A (en) Topology-based management of second day operations
US20130268652A1 (en) Opportunistic system scanning
EP2837135A1 (en) Asset detection system
WO2013155357A1 (en) Network address repository management
US20210226866A1 (en) Threat detection of application traffic flows
CN107659606A (en) The cloud Added Management of equipment
Benomar et al. Cloud-based network virtualization in iot with openstack
CN112956158A (en) Structured data plane monitoring
Meijer et al. Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation
US9992083B1 (en) System to detect network egress points
Wantamanee et al. Virtualising machine to machine (M2M) application using open baton as NFV-compliant framework for building energy management system
Singh et al. HANZO: Collaborative network defense for connected things
Bajpai et al. Global measurements: Practice and experience (report on dagstuhl seminar# 16012)
Forsström et al. Surveying and identifying the communication platforms of the internet of things
Akbarisamani Service based architecture with service mesh platform in the context of 5g core
Schölzel et al. A viable SIEM approach for Android
Ledaal Tapping network traffic in Kubernetes