On-demand security configuration for IoT devices

被引:0
|
作者
Chung, Boheung [1 ]
Kim, Jeongyeo [1 ]
Jeon, Youngsung [1 ]
机构
[1] Elect & Telecommun Res Inst, Cyber Secur Res Dept, Daejeon, South Korea
关键词
configuruation management for security; security function reconfiguration; on-demand security configuration; IoT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
IoT, as one of the main focuses, links various kinds of devices to the Internet and even exchanges its data. The advent of IoT which has vast amount of connected devices enables us to monitor and control of real world and changes our daily lifestyle never available before. With such a massive amount of devices, if we don't set and organize security features on them properly, we will face unexperienced challenges on security issues. In this paper we propose the on-demand security configuration technique that we can configure required security functions and reorganize them without recreating device image. With the help of this approach, if there is a change on this security service, we can substitute the old modules for new ones without regenerating device image.
引用
收藏
页码:1082 / 1084
页数:3
相关论文
共 50 条
  • [1] Hierarchical and On-Demand Attack Defence Framework for IoT Devices
    Sudhakaran, Pradeep
    Kaliyaperumal, Manikannan
    Senthilkumar, T.
    Jeya, R.
    Sowmiya, B.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [2] Resource-aware Security Configuration for Constrained IoT Devices
    Fischer, Marten
    Toenjes, Ralf
    [J]. PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 7 - 14
  • [3] Bootstrapping security configuration for IoT devices on networks with TLS inspection
    Danilchenko, Victor
    Theobald, Matthew
    Cohen, Daniel
    [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [4] On-demand deployment for IoT applications
    Zhang, Jingbin
    Ma, Meng
    He, Wei
    Wang, Ping
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 111
  • [5] Towards Labeling On-Demand IoT Traffic
    Campos, Daniel
    OConnor, T. J.
    [J]. PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, : 49 - 57
  • [6] MODE: A Context-aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices
    He, Wei
    Zhang, Jingbin
    Ma, Meng
    Wang, Ping
    [J]. 2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2017, : 81 - 88
  • [7] Physical layer security for IoT devices configuration and key management - a Proof of Concept
    Brilli, Luca
    Pecorella, Tommaso
    Mucchi, Lorenzo
    [J]. 2016 AEIT INTERNATIONAL ANNUAL CONFERENCE (AEIT) - SUSTAINABLE DEVELOPMENT IN THE MEDITERRANEAN AREA: ENERGY AND ICT NETWORKS OF THE FUTURE, 2016,
  • [8] On-Demand Security Architecture for Cloud Computing
    Chen, Jianyong
    Wang, Yang
    Wang, Xiaomin
    [J]. COMPUTER, 2012, 45 (07) : 73 - 78
  • [9] Towards On-Demand Resource Provisioning for IoT Environments
    Kliem, Andreas
    Renner, Thomas
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT II, 2015, 9012 : 484 - 493
  • [10] A Security Service on-demand Architecture in SDN
    Chou, Li-Der
    Tseng, Chia-Wei
    Huang, Yu-Ki
    Chen, Kuo-Chung
    Ou, Tsung-Fu
    Yen, Chia-Kuan
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 287 - 291