A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.
Bruno CruzSilvana Gómez MeireDavid Ruano-OrdásHelge JanickeIryna YevseyevaJosé Ramon MéndezPublished in: Sci. Program. (2019)
Keyphrases
- security problems
- security mechanisms
- security threats
- protection mechanisms
- unauthorized access
- computer security
- security vulnerabilities
- security issues
- cyber attacks
- security protocols
- security requirements
- security measures
- access control
- computer networks
- java card
- security risks
- chosen plaintext
- key management
- denial of service attacks
- countermeasures
- data security
- data encryption
- malicious users
- stream cipher
- management system
- security policies
- network security
- malicious attacks
- security breaches
- cryptographic protocols
- rfid tags
- information leakage
- rfid systems
- intrusion detection
- identity theft
- information security
- fault injection
- sensitive data
- security flaws
- personal information
- attack scenarios
- buffer overflow
- secure routing
- intrusion detection and prevention
- anomaly detection
- user privacy
- smart card
- ad hoc networks
- data protection
- statistical databases
- cyber security
- security analysis
- personal data
- privacy protection