Towards IoT Security Automation and Orchestration

作者: Yifeng Zheng , Surya Nepal , Arindam Pal , Shiva Raj Pokhrel , Helge Janicke

DOI: 10.1109/TPS-ISA50397.2020.00018

关键词:

摘要: The massive boom of Internet Things (IoT) has led to the explosion smart IoT devices and emergence various applications such as cities, grids, mining, connected health, more. While proliferation systems promises many benefits for different sectors, it also exposes a large attack surface, raising an imperative need put security in first place. It is impractical heavily rely on manual operations deal with applications. Hence, there strong securing minimum human intervention. In light this situation, paper, we envision automation orchestration systems. After conducting comprehensive evaluation literature having conversations industry partners, framework integrating key elements towards goal. For each element, investigate existing landscapes, discuss current challenges, identify future directions. We hope that paper will bring attention academic industrial community solving challenges related

参考文章(49)
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Kashif Habib, Wolfgang Leister, Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures new technologies, mobility and security. pp. 1- 5 ,(2015) , 10.1109/NTMS.2015.7266525
Cheng-Liang Kuo, Chung-Huang Yang, Security Design for Configuration Management of Android Devices computer software and applications conference. ,vol. 3, pp. 249- 254 ,(2015) , 10.1109/COMPSAC.2015.239
Hannan Xiao, Nitin Sidhu, Bruce Christianson, Guarantor and reputation based trust model for Social Internet of Things 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). pp. 600- 605 ,(2015) , 10.1109/IWCMC.2015.7289151
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo, An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing european symposium on research in computer security. pp. 257- 272 ,(2014) , 10.1007/978-3-319-11203-9_15
Ilangko Balasingham, Habtamu Abie, Risk-based adaptive security for smart IoT in eHealth international conference on body area networks. pp. 269- 275 ,(2012) , 10.5555/2442691.2442752
Panos Kampanakis, Security Automation and Threat Information-Sharing Options ieee symposium on security and privacy. ,vol. 12, pp. 42- 51 ,(2014) , 10.1109/MSP.2014.99
Yi Cai, Xudong Liu, A Multi-use CCA-Secure Proxy Re-encryption Scheme ieee international conference on dependable, autonomic and secure computing. pp. 39- 44 ,(2014) , 10.1109/DASC.2014.16
S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, Security, privacy and trust in Internet of Things Computer Networks. ,vol. 76, pp. 146- 164 ,(2015) , 10.1016/J.COMNET.2014.11.008