Wells, 2020 - Google Patents
Better practices for IoT smart home securityWells, 2020
- Document ID
- 3153037656463439112
- Author
- Wells J
- Publication year
External Links
Snippet
Abstract Internet of Things (IoT) has become one of the fastest growing industries especially for smart home consumers. These devices are comprised of home appliances, automated devices, climate control, all which have the functionality of being controlled remotely from a …
- 238000011160 research 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Rondon et al. | Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective | |
Upadhyay et al. | SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations | |
Shah et al. | A survey on Classification of Cyber-attacks on IoT and IIoT devices | |
Makhdoom et al. | Anatomy of threats to the internet of things | |
Panchal et al. | Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures | |
Firdous et al. | Modelling and evaluation of malicious attacks against the iot mqtt protocol | |
Cekerevac et al. | Internet of things and the man-in-the-middle attacks–security and economic risks | |
US10630698B2 (en) | Method and system for network access control based on traffic monitoring and vulnerability detection using process related information | |
Alcaraz et al. | Critical control system protection in the 21st century | |
Hadar et al. | A lightweight vulnerability mitigation framework for IoT devices | |
Scarfone et al. | Sp 800-94. guide to intrusion detection and prevention systems (idps) | |
US10021070B2 (en) | Method and apparatus for federated firewall security | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Varadharajan et al. | Techniques for Enhancing Security in Industrial Control Systems | |
Miloslavskaya et al. | Ensuring information security for internet of things | |
Mudgerikar et al. | Iot attacks and malware | |
Wells | Better practices for IoT smart home security | |
Baugher et al. | Home-network threats and access controls | |
Gupta et al. | Cyber threat analysis of consumer devices | |
Srivastava et al. | Emerging technology IoT and OT: overview, security threats, attacks and countermeasures | |
Rakic-Skokovic | Guidelines for Overcoming some IoT Security Issues | |
Burke | Preventing DDOS attacks against IoT devices | |
Da Paz et al. | A novel approach to resource starvation attacks on message queuing telemetry transport brokers | |
Tanya et al. | A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework |