Enhancing the Security of IoT gateway based on the classification of user security-sensitive data
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee S. | - |
dc.contributor.author | Heo M. | - |
dc.contributor.author | Park K. | - |
dc.contributor.author | Kim B. | - |
dc.contributor.author | Hong J. | - |
dc.date.available | 2020-02-20T03:20:05Z | - |
dc.date.created | 2020-02-18 | - |
dc.date.issued | 2019-09 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/35494 | - |
dc.description.abstract | With the widespread use of the IoT, there is an increasing threat to the systems and data of IoT devices that handle user security-sensitive data about users. In particular, if the IoT gateway, which serves as a gateway between the IoT devices and the Internet, is exposed to malicious attacks, serious problems may occur in the entire IoT computing system. This paper proposes a technique to efficiently classify and manage data in order to enhance the security of resource-constrained IoT gateways. Experiments show that even if the number of connected devices and data to be processed increases, the performance of the IoT gateway is not significantly degraded by the proposed technique. © 2019 Association for Computing Machinery. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinery, Inc | - |
dc.relation.isPartOf | Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019 | - |
dc.title | Enhancing the Security of IoT gateway based on the classification of user security-sensitive data | - |
dc.type | Article | - |
dc.identifier.doi | 10.1145/3338840.3355686 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019, pp.241 - 243 | - |
dc.description.journalClass | 3 | - |
dc.identifier.scopusid | 2-s2.0-85077214366 | - |
dc.citation.endPage | 243 | - |
dc.citation.startPage | 241 | - |
dc.citation.title | Proceedings of the 2019 Research in Adaptive and Convergent Systems, RACS 2019 | - |
dc.contributor.affiliatedAuthor | Hong J. | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | Trustzone | - |
dc.subject.keywordAuthor | User security-sensitive data | - |
dc.subject.keywordPlus | Classification (of information) | - |
dc.subject.keywordPlus | Gateways (computer networks) | - |
dc.subject.keywordPlus | Information management | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Computing system | - |
dc.subject.keywordPlus | Exposed to | - |
dc.subject.keywordPlus | Malicious attack | - |
dc.subject.keywordPlus | Sensitive datas | - |
dc.subject.keywordPlus | Trustzone | - |
dc.subject.keywordPlus | Internet of things | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.