Security of IoT Application Layer: Requirements, Threats, and Solutions.
Mahmoud AbbasiMarta Plaza-HernándezYeray MezquitaPublished in: ISAmI (2022)
Keyphrases
- application layer
- network layer
- physical layer
- security problems
- ddos attacks
- denial of service attacks
- security issues
- information security
- security threats
- buffer overflow
- security breaches
- cyber security
- security measures
- security services
- computer security
- key management
- cyber attacks
- security vulnerabilities
- network security
- end to end
- intrusion detection
- transport layer
- critical infrastructure
- security requirements
- security mechanisms
- video streaming
- cross layer
- metadata
- overlay network
- countermeasures
- cloud computing
- access control