From internet of threats to internet of things: A cyber security architecture for smart homes
Ημερομηνία
2019Γλώσσα
en
Λέξη-κλειδί
Επιτομή
The H2020 European research project GHOST-Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control-aims to deploy a highly effective security framework for IoT smart home residents through a novel reference architecture for user-centric cyber security in smart homes providing an unobtrusive and user-comprehensible solution. The aforementioned security framework leads to a transparent cyber security environment by increasing the effectiveness of the existing cyber security services and enhancing system's self-defence through disruptive software-enabled network security solutions. In this paper, GHOST security framework for IoT-based smart homes is presented. It is aiming to address the security challenges posed by several types of attacks, such as network, device and software. The effective design of the overall multi-layered architecture is analysed, with particular emphasis given to the integration aspects through dynamic and re-configurable solutions and the features provided by each one of the architectural layers. Additionally, real-life trials and the associated use cases are described showcasing the competences and potential of the proposed framework. © 2019 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A framework for secure data delivery in wireless sensor networks
Perlepes, L.; Zaharis, A.; Stamoulis, G.; Kikiras, P. (2012)Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
Kopsidas, S.; Zisiadis, D.; Tassiulas, L. (2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ... -
Multi-screen lock: Visual passwords from user’s social data
Tsoukas V., Gkogkidis A., Kakarountas A., Giannakas G. (2019)A critical issue for a mobile device user is the protection of stored sensitive data and their access, via the device. A widely used technique for protecting the mobile device with a display is the lock screen. Many security ...