Autonomic Methods for Mitigating Threats to the Internet of Things (IoT)

被引:1
作者
Rahman, Shawon S. M. [1 ]
Jackson, George W., Jr. [2 ]
机构
[1] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
[2] Capella Univ, Minneapolis, MN 55402 USA
来源
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) | 2017年
关键词
Internet of Things; IoT Security; Machine-to-machine Information Management; Security Threats; Information Security; network security;
D O I
10.1109/CSCI.2017.227
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Increasing improvements to wireless technology, coupled with enhancements to device miniaturization, have fueled the advancement of a networking infrastructure referred to as the Internet of Things (IoT). In the IoT devices and software within these devices are designed to interact directly with each other. As these IoT systems are ostensibly designed to require minimal human intervention it seems reasonable to suggest automated methods for securing these systems would be highly appropriate [2]. This paper seeks to evaluate significant developments in network security protection mechanisms as they apply to our current understanding of the Internet of Things and seeks to uncover as well as possibly suggest new areas of network security development in the IoT arena. Additionally, this paper will analyze information from scholarly sources and evaluate different methods, strategies and frameworks related to IoT security
引用
收藏
页码:1302 / 1307
页数:6
相关论文
共 43 条
  • [1] Ahamed Syed, 2010, 1 INT WORKSH COMM SE
  • [2] Al-Mamun Abdullah, 2017, INT J COMPUTER NETWO, V9
  • [3] Critical infrastructure protection: Requirements and challenges for the 21st century
    Alcaraz, Cristina
    Zeadally, Sherali
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 : 53 - 66
  • [4] [Anonymous], 2015, ARXIV150203552
  • [5] Autonomic schemes for threat mitigation in Internet of Things
    Ashraf, Qazi Mamoon
    Habaebi, Mohamed Hadi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 49 : 112 - 127
  • [6] Collaborative Relaying Strategies in Autonomic Management of Mobile Robotics
    Barraca, Joao Paulo
    Sadeghi, Rasool
    Aguiar, Rui L.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (03) : 1077 - 1096
  • [7] Vulnerability Assessment in Autonomic Networks and Services: A Survey
    Barrere, Martin
    Badonnel, Remi
    Festor, Olivier
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 988 - 1004
  • [8] Benson Karen, 2011, INT J COMPUTER SCI E, V2
  • [9] Bisong A, 2011, INT J NETWORK SECURI, V3
  • [10] Borgohain Tuhin, 2015, International Journal of Advanced Networking and Applications, V6, P2422