Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project

被引:15
作者
Domanska, Joanna [1 ]
Gelenbe, Erol [2 ]
Czachorski, Tadek [1 ]
Drosou, Anastasis [3 ]
Tzovaras, Dimitrios [3 ]
机构
[1] Polish Acad Sci, IITIS, Gliwice, Poland
[2] Imperial Coll London, Dept Elect & Elect Engn, London, England
[3] CERTH, ITI, Thessaloniki, Greece
来源
SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018 | 2018年 / 821卷
基金
欧盟地平线“2020”;
关键词
Cybersecurity; IoT; Network attacks; Attack detection; Random Neural Network; Cognitive packet routing; APPROXIMATION; ATTACKS; TIME;
D O I
10.1007/978-3-319-95189-8_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) was born in the mid 2010's, when the threshold of connecting more objects than people to the Internet, was crossed. Thus, attacks and threats on the content and quality of service of the IoT platforms can have economic, energetic and physical security consequences that go way beyond the traditional Internet's lack of security, and way beyond the threats posed by attacks to mobile telephony. Thus, this paper describes the H2020 project "Secure and Safe Internet of Things" (SerIoT) which will optimize the information security in IoT platforms and networks in a holistic, cross-layered manner (i.e. IoT platforms and devices, honeypots, SDN routers and operator's controller) in order to offer a secure SerIoT platform that can be used to implement secure IoT platforms and networks anywhere and everywhere.
引用
收藏
页码:101 / 118
页数:18
相关论文
共 46 条
  • [41] The sleep deprivation attack in sensor networks: Analysis and methods of defense
    Pirretti, Matthew
    Zhu, Sencun
    Vijaykrishnan, N.
    McDaniel, Patrick
    Kandemir, Mahmut
    Brooks, Richard
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (03): : 267 - 287
  • [42] Ratasuk R, 2015, INT CONF INTELL NEXT, P52, DOI 10.1109/ICIN.2015.7073806
  • [43] Adaptive Dispatching of Tasks in the Cloud
    Wang, Lan
    Gelenbe, Erol
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) : 33 - 45
  • [44] Wang L, 2016, IEEE SYS MAN CYBERN, P3984, DOI 10.1109/SMC.2016.7844856
  • [45] Xiaoming Lu, 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), P403, DOI 10.1109/SECURWARE.2008.45
  • [46] Bitcoin: Under the Hood
    Zohar, Aviv
    [J]. COMMUNICATIONS OF THE ACM, 2015, 58 (09) : 104 - 113