Meijer et al., 2022 - Google Patents
Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and ExperimentationMeijer et al., 2022
View PDF- Document ID
- 10470046078871791805
- Author
- Meijer M
- Petrucci G
- Schotsman M
- Zangrandi L
- Van Ede T
- Continella A
- Gankhuyag G
- Allodi L
- Sciancalepore S
- Publication year
- Publication venue
- 2022 IEEE 8th World Forum on Internet of Things (WF-IoT)
External Links
Snippet
This paper introduces the Federated Lab (in short, FedLab), a virtual platform enabling shared research and experimentation on Internet of Things (IoT) devices, protocols, and functionalities in a network of geographically-distributed peers. In a nutshell, the FedLab …
- 238000002474 experimental method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11218376B2 (en) | Algorithmic problem identification and resolution in fabric networks by software defined operations, administration, and maintenance | |
Bhat et al. | Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities | |
Cox et al. | Advancing software-defined networks: A survey | |
Bajpai et al. | A survey on internet performance measurement platforms and related standardization efforts | |
Arzo et al. | A theoretical discussion and survey of network automation for IoT: Challenges and opportunity | |
CN115918139A (en) | Active assurance of network slicing | |
US10764127B2 (en) | Techniques for virtualized network capacity management | |
CN113016167A (en) | Method and device for enabling right to follow terminal equipment in network | |
JP2017534109A (en) | Topology-based management of second day operations | |
US20130268652A1 (en) | Opportunistic system scanning | |
EP2837135A1 (en) | Asset detection system | |
WO2013155357A1 (en) | Network address repository management | |
US20210226866A1 (en) | Threat detection of application traffic flows | |
CN107659606A (en) | The cloud Added Management of equipment | |
Benomar et al. | Cloud-based network virtualization in iot with openstack | |
CN112956158A (en) | Structured data plane monitoring | |
Meijer et al. | Federated Lab (FedLab): An Open-source Distributed Platform for Internet of Things (IoT) Research and Experimentation | |
US9992083B1 (en) | System to detect network egress points | |
Wantamanee et al. | Virtualising machine to machine (M2M) application using open baton as NFV-compliant framework for building energy management system | |
Singh et al. | HANZO: Collaborative network defense for connected things | |
Bajpai et al. | Global measurements: Practice and experience (report on dagstuhl seminar# 16012) | |
Forsström et al. | Surveying and identifying the communication platforms of the internet of things | |
Akbarisamani | Service based architecture with service mesh platform in the context of 5g core | |
Schölzel et al. | A viable SIEM approach for Android | |
Ledaal | Tapping network traffic in Kubernetes |