Alexandru Vochescu, Ioana Culic, Alexandru Radovici
{"title":"物联网设备的多层安全框架","authors":"Alexandru Vochescu, Ioana Culic, Alexandru Radovici","doi":"10.1109/RoEduNet51892.2020.9324871","DOIUrl":null,"url":null,"abstract":"One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"31 12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multi-Layer Security Framework for IoT Devices\",\"authors\":\"Alexandru Vochescu, Ioana Culic, Alexandru Radovici\",\"doi\":\"10.1109/RoEduNet51892.2020.9324871\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.\",\"PeriodicalId\":140521,\"journal\":{\"name\":\"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"volume\":\"31 12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RoEduNet51892.2020.9324871\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RoEduNet51892.2020.9324871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.