Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Protection scheme for IoT devices using introspection

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Chulhyun-
dc.contributor.authorAbbas, Fizza-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2021-06-22T21:41:37Z-
dc.date.available2021-06-22T21:41:37Z-
dc.date.created2021-01-22-
dc.date.issued2015-09-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/20549-
dc.description.abstractThese days Internet of Things (IoT) is considered to be the extension of machine-to-machine (M2M) communication that supports various domains, protocols, and applications. Users share their personal information with IoT device to get various services. However, if IoT device loses integrity or malfunctions due to some malicious attack, it causes direct or indirect risks to users' privacy. Consequently, users' personal information can be leaked through IoT devices. Moreover, IoT devices have limited computational resources as compared to general purpose computers and operating systems (OS). They also have various traits depending on the environment in which they are being used. Due to these reasons, general protection methods and integral solutions are difficult to be applied. In this regard, this paper proposes a protection method that detects malicious activity using introspection. Moreover, through experimental results we show that our proposed approach not only enhances the security of IoT devices but also effectively protects users' personal information. © 2015 IEEE.-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleProtection scheme for IoT devices using introspection-
dc.typeArticle-
dc.contributor.affiliatedAuthorOh, Heekuck-
dc.identifier.doi10.1109/NOF.2015.7333292-
dc.identifier.scopusid2-s2.0-84961911849-
dc.identifier.wosid000388456000013-
dc.identifier.bibliographicCitation2015 International Conference on the Network of the Future, NOF 2015, pp.1 - 5-
dc.relation.isPartOf2015 International Conference on the Network of the Future, NOF 2015-
dc.citation.title2015 International Conference on the Network of the Future, NOF 2015-
dc.citation.startPage1-
dc.citation.endPage5-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusComputer operating systems-
dc.subject.keywordPlusGeneral purpose computers-
dc.subject.keywordPlusInternet-
dc.subject.keywordPlusInternet protocols-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusComputational resources-
dc.subject.keywordPlusHypervisor-
dc.subject.keywordPlusInternet of Things (IOT)-
dc.subject.keywordPlusIntrospection-
dc.subject.keywordPlusMachine-to-machine communications-
dc.subject.keywordPlusMalicious activities-
dc.subject.keywordPlusPersonal information-
dc.subject.keywordPlusVirtualization technologies-
dc.subject.keywordPlusInternet of things-
dc.subject.keywordAuthorHypervisor-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorIntrospection-
dc.subject.keywordAuthorVirtualization technology-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7333292/-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE