Securing small business and home Internet of Things (IoT) devices: Mitigating network-based attacks using manufacturer usage description (MUD)

D Dodson, D Montgomery, W Polk, M Ranganathan… - 2020 - csrc.nist.gov
… ’s resilience to network based attacks. In this … an IoT device connects to a home or
small-business network, MUD can automatically permit the device to send and receive only the traffic …

[PDF][PDF] Securing Small-Business and Home Internet of Things (IoT) Devices

MNBAU Manufacturer - NIST SPECIAL PUBLICATION, 1800 - nccoe.nist.gov
… ’s resilience to networkbased attacks. In this project, the NCCoE demonstrated the … IoT
device connects to a home or small-business network, MUD can automatically permit the device to …

[HTML][HTML] Securing small-business and home internet of things (iot) devices

D Dodson, T Polk, M Souppaya, WC Barker, P Grayeli… - 2019 - nccoe.nist.gov
… the opportunity for an IoT device to be compromised by a network-based attack and reduces
the ability of compromised devices to participate in network-based attacks such as DDoS …

Securing the Internet of Things: best practices for deploying IoT devices

BR Payne, TT Abegaz - Computer and Network Security Essentials, 2018 - Springer
… some of the present best-practice mitigation strategies to prevent most attacks from being …
is the potential for cyber-physical attacks: computer-based and network-based attacks that …

Low-cost flow-based security solutions for smart-home IoT devices

A Sivanathan, D Sherratt… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
… proposals to develop network-based security solutions [12] … Securing IoT devices in the
emerging smart-home is a critical … to detect and mitigate IoT security threats. Specifically, we have …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… , DoS attacks in IoT can be host based or network based. In … under the category of
Network-based DoS attacks. Moreover, … Internet of Things,” IEEE Internet Things J., vol. 6, no. 6, …

[HTML][HTML] Review of Smart-Home Security Using the Internet of Things

G Vardakis, G Hatzivasilis, E Koutsaki, N Papadakis - Electronics, 2024 - mdpi.com
… Additionally, the paper discusses existing security mechanisms and protocols designed
to mitigate these risks, such as encryption, authentication, and intrusion-detection systems. …

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD

M Ranganathan, WC Barker, D Cohen, K Yeich, E Lear… - 2019 - policycommons.net
… to retrieve the MUD file for a specific IoT device, the MUD manager will drop the connection
… whether to allow or block traffic to the IoT device in ques- tion Associated Test Case(. [...] …

[PDF][PDF] Mitigation of DDOS and MiTM attacks using belief based secure correlation approach in SDN-based IoT networks

MM Cherian, SL Varma - … Network and Information Security, 2022 - academia.edu
… algorithms our BBSC security algorithm has very little detection time because of its … analyzed
to secure the IoT network based on SDN in real testbeds to detect and mitigate DDoS and …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
… First, we introduce components of the E-IoT devices layer, and … mitigation mechanisms.
Table 2 provides an overview of E-IoT Device-layer components, threats, attacks, and mitigation