Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project

被引:15
|
作者
Domanska, Joanna [1 ]
Gelenbe, Erol [2 ]
Czachorski, Tadek [1 ]
Drosou, Anastasis [3 ]
Tzovaras, Dimitrios [3 ]
机构
[1] Polish Acad Sci, IITIS, Gliwice, Poland
[2] Imperial Coll London, Dept Elect & Elect Engn, London, England
[3] CERTH, ITI, Thessaloniki, Greece
基金
欧盟地平线“2020”;
关键词
Cybersecurity; IoT; Network attacks; Attack detection; Random Neural Network; Cognitive packet routing; APPROXIMATION; ATTACKS; TIME;
D O I
10.1007/978-3-319-95189-8_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) was born in the mid 2010's, when the threshold of connecting more objects than people to the Internet, was crossed. Thus, attacks and threats on the content and quality of service of the IoT platforms can have economic, energetic and physical security consequences that go way beyond the traditional Internet's lack of security, and way beyond the threats posed by attacks to mobile telephony. Thus, this paper describes the H2020 project "Secure and Safe Internet of Things" (SerIoT) which will optimize the information security in IoT platforms and networks in a holistic, cross-layered manner (i.e. IoT platforms and devices, honeypots, SDN routers and operator's controller) in order to offer a secure SerIoT platform that can be used to implement secure IoT platforms and networks anywhere and everywhere.
引用
收藏
页码:101 / 118
页数:18
相关论文
共 50 条
  • [21] Research on the Innovation of Sharing Logistics Mode Based on Internet of Things
    Zhou, Jun
    Huang, Wenxiang
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 424 - 427
  • [22] Research on Organizational Capabilities Enhancement in Technological Innovation of Internet of Things
    Cheng, Yue
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON JUDICIAL, ADMINISTRATIVE AND HUMANITARIAN PROBLEMS OF STATE STRUCTURES AND ECONOMICAL SUBJECTS (JAHP 2016), 2016, 76 : 46 - 50
  • [23] The Wireless Sensor Network Security Protocol Research in Internet of Things
    Lee, John
    Zhou, Hua
    Liang, Zhihong
    Wan, Xiangcheng
    Chen, Yuhong
    ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 241 - +
  • [24] Current research on Internet of Things (IoT) security protocols: A survey
    Mishra, Raghavendra
    Mishra, Ankita
    COMPUTERS & SECURITY, 2025, 151
  • [25] Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey
    Wu, Hui
    Han, Haiting
    Wang, Xiao
    Sun, Shengli
    IEEE ACCESS, 2020, 8 (08): : 153826 - 153848
  • [26] Research on Security Protection Technology System of Power internet of things
    Gao, Peng
    Yang, Ruxia
    Shi, Congcong
    Zhang, Xiaojian
    PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1772 - 1776
  • [27] Research on Internet of Things security architecture based on fog computing
    Mai, Trung Dong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [28] Research on the Security Technology of the Internet of Things in Nuclear Power Plant
    Liang, Hui-Hui
    Gao, Xin-Xin
    Ye, Wang-Ping
    Liu, Wei
    NUCLEAR POWER PLANTS: INNOVATIVE TECHNOLOGIES FOR INSTRUMENTATION AND CONTROL SYSTEMS (ISNPP 2019), 2020, 595 : 556 - 562
  • [29] Research on the Privacy Security and Defense Strategies on the Internet of Things Platform
    Bian, Qian
    Wang, Zhenduo
    Wang, Yingqiang
    Zhang, Weigang
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 218 - 223
  • [30] Internet of Things: Application Areas and Research Results of the FIRST Project
    Gal, Zoltan
    Almasi, Bela
    Daboczi, Tamas
    Vida, Rolland
    Oniga, Stefan
    Baran, Sandor
    Farkas, Istvan
    INFOCOMMUNICATIONS JOURNAL, 2014, 6 (03): : 37 - 44