The Impact of Manufacturer Usage Description (MUD) on IoT Security.
Zeno HeebOnur KalinagacWissem SoussiGürkan GürPublished in: 6GNet (2022)
Keyphrases
- cloud computing
- security issues
- big data
- security problems
- security mechanisms
- security threats
- information security
- high level
- network security
- third party
- security systems
- security requirements
- sensitive data
- access control
- intrusion detection
- cyber attacks
- security measures
- data security
- key management
- supply chain