Defining the behavior of IoT devices through the MUD standard: Review, challenges, and research directions

JL Hernández-Ramos, SN Matheu, A Feraudo… - IEEE …, 2021 - ieeexplore.ieee.org
With the strong development of the Internet of Things (IoT), the definition of IoT devices'
intended behavior is key for an effective detection of potential cybersecurity attacks and …

[HTML][HTML] A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research …

NN Josbert, M Wei, W Ping, A Rafiq - Journal of King Saud University …, 2024 - Elsevier
Abstract The Internet of Things (IoT) provides a major contribution to the innovation of smart
manufacturing and industrial automation. Due to IoT, network devices and intelligent …

Role of device identification and manufacturer usage description in iot security: A survey

N Mazhar, R Salleh, M Zeeshan, MM Hameed - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents an overview of device identification techniques and the Manufacturer
Usage Description (MUD) standard used for the Internet of things to reduce the IoT attack …

Trust schemas and icn: key to secure home iot

K Nichols - Proceedings of the 8th ACM Conference on Information …, 2021 - dl.acm.org
Home and business internet of things (IoT) networking presents security challenges that can
be addressed using information-centric networking (ICN) to secure information rather than …

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles

L Morgese Zangrandi, T Van Ede, T Booij… - Proceedings of the 38th …, 2022 - dl.acm.org
Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in
security measures, leading to attacks increasing every year. In particular, network …

Toward a blockchain-based platform to manage cybersecurity certification of IoT devices

R Neisse, JL Hernández-Ramos… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
The goal of this paper is to propose a blockchain-based platform to enhance transparency
and traceability of cybersecurity certification information motivated by the recently adopted …

A Gateway-based MUD Architecture to Enhance Smart Home Security

F Corno, L Mannella - 2023 8th International Conference on …, 2023 - ieeexplore.ieee.org
Smart home systems, including consumer-grade Internet of Things (IoT) devices, are in a
dangerous situation. On the one hand, the number of smart homes is increasing. On the …

On the analysis of mud-files' interactions, conflicts, and configuration requirements before deployment

V Andalibi, E Lear, DI Kim, LJ Camp - … on Safety and Security with IoT …, 2022 - Springer
Abstract Manufacturer Usage Description (MUD) is an Internet Engineering Task Force
(IETF) standard designed to protect IoT devices and networks by creating an out-of-the-box …

[图书][B] Cybersecurity of Genomic Data

R Pulivarti, R Pulivarti, N Martin, FR Byers, J Wagner… - 2023 - csrc.nist.rip
Genomic data has enabled the rapid growth of the US bioeconomy and is valuable to the
individual, industry, and government because it has multiple intrinsic properties that in …

An Architecture of Enhanced Profiling Assurance for IoT Networks

N Aroon, V Liu, L Kane, Y Li, AD Tesfamicael… - …, 2024 - search.proquest.com
Attacks launched from IoT networks can cause significant damage to critical network
systems and services. IoT networks may contain a large volume of devices. Protecting these …