Securing vulnerable home IoT devices with an in-hub security manager.
Anna Kornfeld SimpsonFranziska RoesnerTadayoshi KohnoPublished in: PerCom Workshops (2017)
Keyphrases
- information security
- home network
- management system
- security policies
- security problems
- security risks
- smart home
- security requirements
- security issues
- home environment
- key management
- network security
- security threats
- home environments
- intrusion detection
- medical devices
- remote control
- identity management
- mobile devices
- home appliances
- embedded systems
- cloud computing
- data security
- access control
- statistical databases
- distributed systems
- smart card
- mobile computing
- high assurance
- ubiquitous computing environments
- security protocols
- data integrity
- rfid tags
- location information