Protection scheme for IoT devices using introspection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Chulhyun | - |
dc.contributor.author | Abbas, Fizza | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-22T21:41:37Z | - |
dc.date.available | 2021-06-22T21:41:37Z | - |
dc.date.created | 2021-01-22 | - |
dc.date.issued | 2015-09 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/20549 | - |
dc.description.abstract | These days Internet of Things (IoT) is considered to be the extension of machine-to-machine (M2M) communication that supports various domains, protocols, and applications. Users share their personal information with IoT device to get various services. However, if IoT device loses integrity or malfunctions due to some malicious attack, it causes direct or indirect risks to users' privacy. Consequently, users' personal information can be leaked through IoT devices. Moreover, IoT devices have limited computational resources as compared to general purpose computers and operating systems (OS). They also have various traits depending on the environment in which they are being used. Due to these reasons, general protection methods and integral solutions are difficult to be applied. In this regard, this paper proposes a protection method that detects malicious activity using introspection. Moreover, through experimental results we show that our proposed approach not only enhances the security of IoT devices but also effectively protects users' personal information. © 2015 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Protection scheme for IoT devices using introspection | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Oh, Heekuck | - |
dc.identifier.doi | 10.1109/NOF.2015.7333292 | - |
dc.identifier.scopusid | 2-s2.0-84961911849 | - |
dc.identifier.wosid | 000388456000013 | - |
dc.identifier.bibliographicCitation | 2015 International Conference on the Network of the Future, NOF 2015, pp.1 - 5 | - |
dc.relation.isPartOf | 2015 International Conference on the Network of the Future, NOF 2015 | - |
dc.citation.title | 2015 International Conference on the Network of the Future, NOF 2015 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 5 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Computer operating systems | - |
dc.subject.keywordPlus | General purpose computers | - |
dc.subject.keywordPlus | Internet | - |
dc.subject.keywordPlus | Internet protocols | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Computational resources | - |
dc.subject.keywordPlus | Hypervisor | - |
dc.subject.keywordPlus | Internet of Things (IOT) | - |
dc.subject.keywordPlus | Introspection | - |
dc.subject.keywordPlus | Machine-to-machine communications | - |
dc.subject.keywordPlus | Malicious activities | - |
dc.subject.keywordPlus | Personal information | - |
dc.subject.keywordPlus | Virtualization technologies | - |
dc.subject.keywordPlus | Internet of things | - |
dc.subject.keywordAuthor | Hypervisor | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Introspection | - |
dc.subject.keywordAuthor | Virtualization technology | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/7333292/ | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.