IoT survey: An SDN and fog computing perspective

O Salman, I Elhajj, A Chehab, A Kayssi - Computer Networks, 2018 - Elsevier
Recently, there has been an increasing interest in the Internet of Things (IoT). While some
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …

DÏoT: A federated self-learning anomaly detection system for IoT

TD Nguyen, S Marchal, M Miettinen… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …

HomeSnitch: behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …

Defining the behavior of IoT devices through the mud standard: Review, challenges, and research directions

JL Hernández-Ramos, SN Matheu, A Feraudo… - IEEE …, 2021 - ieeexplore.ieee.org
With the strong development of the Internet of Things (IoT), the definition of IoT devices'
intended behavior is key for an effective detection of potential cybersecurity attacks and …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …

Security architecture for defining and enforcing security profiles in DLT/SDN-based IoT systems

SN Matheu, A Robles Enciso, A Molina Zarca… - Sensors, 2020 - mdpi.com
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the
increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices …

Vigilia: Securing smart home edge computing

R Trimananda, A Younis, B Wang, B Xu… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Smart home IoT devices are becoming increasingly popular. Modern programmable smart
home hubs such as SmartThings enable homeowners to manage devices in sophisticated …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

[PDF][PDF] Standardizing IoT network security policy enforcement

D Barrera, I Molloy, H Huang - Workshop on decentralized IoT …, 2018 - ndss-symposium.org
This paper discusses the design of a standardized network security policy enforcement
architecture for IoT devices. We show that the network behavior of many consumer IoT …

Linux security: A survey

MR Yaswinski, MM Chowdhury… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Linux is used in a large variety of situations, from private homes on personal machines to
businesses storing personal data on servers. This operating system is often seen as more …