Skip to main content
Top

2021 | OriginalPaper | Chapter

21. IoT Security Best Practices

Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT

Author : Marco Barenkamp

Published in: IoT – Best Practices

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Der Artikel gibt einen Überblick über Best-Practice-Standards zur Authentifizierung von IoT (Internet of Things) Zugängen. Es wird aufgezeigt, dass clientseitige Authentifizierung gegenüber einer herkömmlichen Authentifizierung und Blockchain-basierten Ansätzen das höchste Potenzial für sichere Prozessautomatisierung bei hoher Interaktionsfrequenz bietet.
Ein neuartiges Konzept des clientseitigen automatisierten Zugangsmanagements auf Basis von TLS (transport layer security), welches sich im Agriculture Segment seit über einem Jahr bewährt hat, wird vorgestellt. Gegenüber derzeitig eingesetzten Authentifizierungsverfahren bietet es den Vorteil höherer Sicherheit bei gleichzeitig automatisierter Anmeldung jeglicher Endgeräte auf dem IoT-Server. Aufgrund dieser Potenziale eignet sich der dargestellte Authentifizierungsstandard zukünftig als allgemeines branchenübergreifendes Zugangssystem für IoT-Anwendungen.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412CrossRef Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412CrossRef
go back to reference Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Computer Netw 54(15):2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Computer Netw 54(15):2787–2805CrossRef
go back to reference Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66CrossRef Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66CrossRef
go back to reference Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949CrossRef Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949CrossRef
go back to reference Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009, November) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, S 19–30, Chicago Illinois USA Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009, November) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on cloud computing security, Chicago, S 19–30, Chicago Illinois USA
go back to reference Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33CrossRef Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33CrossRef
go back to reference Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. IEEE Wirel Commun 22(2):118–125CrossRef Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. IEEE Wirel Commun 22(2):118–125CrossRef
go back to reference Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols--LDAPv3 Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols--LDAPv3
go back to reference Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 internet measurement conference, Santa Monica, S 527–541 Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 internet measurement conference, Santa Monica, S 527–541
go back to reference Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280:1–151 Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280:1–151
go back to reference Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126CrossRef Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126CrossRef
go back to reference Farrell S, Kahan J (2005, September) Using the XML key management specification (and breaking x. 509 rules as you go. In: IFIP international conference on communications and multimedia security. Springer, Berlin/Heidelberg, S 348–357CrossRef Farrell S, Kahan J (2005, September) Using the XML key management specification (and breaking x. 509 rules as you go. In: IFIP international conference on communications and multimedia security. Springer, Berlin/Heidelberg, S 348–357CrossRef
go back to reference Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: Application in precision agriculture. Sensors 16(7):1141CrossRef Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: Application in precision agriculture. Sensors 16(7):1141CrossRef
go back to reference Fischer K, Geßner J (2012) Security architecture elements for IoT enabled automation networks. In: Proceedings of 2012 IEEE 17th international conference on Emerging Technologies & Factory Automation (ETFA 2012). IEEE, Krakow, S 1–8 Fischer K, Geßner J (2012) Security architecture elements for IoT enabled automation networks. In: Proceedings of 2012 IEEE 17th international conference on Emerging Technologies & Factory Automation (ETFA 2012). IEEE, Krakow, S 1–8
go back to reference Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd international symposium on wireless systems within the conferences on intelligent data acquisition and advanced computing systems. IEEE, Offenburg, S 48–54 Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd international symposium on wireless systems within the conferences on intelligent data acquisition and advanced computing systems. IEEE, Offenburg, S 48–54
go back to reference Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on computer and communications security, New York, S 38–49 Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on computer and communications security, New York, S 38–49
go back to reference Gupta H, and P. C. van Oorschot, „Onboarding and Software Update Architecture for IoT Devices,“ 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 2019, pp. 1-11, doi: 10.1109/PST47121.2019.8949023 Gupta H, and P. C. van Oorschot, „Onboarding and Software Update Architecture for IoT Devices,“ 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 2019, pp. 1-11, doi: 10.1109/PST47121.2019.8949023
go back to reference Han R, Gramoli V, Xu X (2018) Evaluating blockchains for IoT. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, Paris, S 1–5 Han R, Gramoli V, Xu X (2018) Evaluating blockchains for IoT. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, Paris, S 1–5
go back to reference Ikovic O, Boˇskovic D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: Model and data engineering: 9th international conference, MEDI 2019, Toulouse, France, October 28–31, 2019, proceedings, Bd 11815. Springer Nature, Toulouse, S 172 Ikovic O, Boˇskovic D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: Model and data engineering: 9th international conference, MEDI 2019, Toulouse, France, October 28–31, 2019, proceedings, Bd 11815. Springer Nature, Toulouse, S 172
go back to reference Khor JH, Sidorov M (2018) Weakness of ultra-lightweight mutual authentication protocol for IoT devices using RFlD tags. In: 2018 Eighth international conference on Information Science and Technology (ICIST). IEEE, Cordoba, S 91–97 Khor JH, Sidorov M (2018) Weakness of ultra-lightweight mutual authentication protocol for IoT devices using RFlD tags. In: 2018 Eighth international conference on Information Science and Technology (ICIST). IEEE, Cordoba, S 91–97
go back to reference Koutanov, E. (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java. Obsidian Dynamics Koutanov, E. (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java. Obsidian Dynamics
go back to reference Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In Proceedings of the 2014, IEEE international symposiumon next-generation electronics, Kwei-Shan, Taiwan, 7–10.05 2014, S 1–2 Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In Proceedings of the 2014, IEEE international symposiumon next-generation electronics, Kwei-Shan, Taiwan, 7–10.05 2014, S 1–2
go back to reference Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Futur Gener Comput Syst 86:641–649CrossRef Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Futur Gener Comput Syst 86:641–649CrossRef
go back to reference Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259CrossRef Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259CrossRef
go back to reference Lu RJ, Liu ZG, Zheng XH (2006) United authentication platform based on HTTPS tunnel technology [J]. Application research of computers, College of Computer Science, Southwest University of Science & Technology, Mianyang Sichuan, S 12 Lu RJ, Liu ZG, Zheng XH (2006) United authentication platform based on HTTPS tunnel technology [J]. Application research of computers, College of Computer Science, Southwest University of Science & Technology, Mianyang Sichuan, S 12
go back to reference Mayer CP (2009) Security and privacy challenges in the internet of things. Electronic Communications of the EASST, Kassel, S 17 Mayer CP (2009) Security and privacy challenges in the internet of things. Electronic Communications of the EASST, Kassel, S 17
go back to reference Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint. Cornell University. http://arxiv.org/abs/1808.03071 Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint. Cornell University. http://​arxiv.​org/​abs/​1808.​03071
go back to reference Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Prog Comput Sci 93:931–939CrossRef Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Prog Comput Sci 93:931–939CrossRef
go back to reference Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546CrossRef Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546CrossRef
go back to reference Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84CrossRef Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84CrossRef
go back to reference Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131CrossRef Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131CrossRef
go back to reference Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533CrossRef Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533CrossRef
go back to reference Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012). Internet of things (Iot) and cloud computing for agriculture: an overview. Proceedings of agro-informatics and precision agriculture (AIPA 2012), India, 292–296 Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012). Internet of things (Iot) and cloud computing for agriculture: an overview. Proceedings of agro-informatics and precision agriculture (AIPA 2012), India, 292–296
go back to reference Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International conference on model and data engineering. Springer, Cham, S 172–183CrossRef Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International conference on model and data engineering. Springer, Cham, S 172–183CrossRef
go back to reference Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE wireless communications and networking conference (WCNC). IEEE, Istanbul, S 2728–2733 Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE wireless communications and networking conference (WCNC). IEEE, Istanbul, S 2728–2733
go back to reference Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19CrossRef Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19CrossRef
go back to reference Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 international conference on internet of things and applications (IOTA). IEEE, Pune S 137–142 Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 international conference on internet of things and applications (IOTA). IEEE, Pune S 137–142
go back to reference Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt, HeidelbergMATH Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt, HeidelbergMATH
go back to reference Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA conference. Springer, Berlin/Heidelberg, S 28–43 Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA conference. Springer, Berlin/Heidelberg, S 28–43
go back to reference Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE, New Delhi, S 1456–1458 Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE, New Delhi, S 1456–1458
go back to reference Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833CrossRef Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833CrossRef
go back to reference Shin S, Kobara K (2016) A security framework for MQTT. In 2016 IEEE conference on communications and network security (CNS), Philadelphia, S 432–436 Shin S, Kobara K (2016) A security framework for MQTT. In 2016 IEEE conference on communications and network security (CNS), Philadelphia, S 432–436
go back to reference Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRef
go back to reference Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inform Privacy Secur 7(2):3–27CrossRef Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inform Privacy Secur 7(2):3–27CrossRef
go back to reference Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. In: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Halifax, S 1129–1136 Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. In: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Halifax, S 1129–1136
go back to reference Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on client-server architecture for accessing cloud computing. Int J Emerg Technol Adv Eng 2(7):95–99 Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on client-server architecture for accessing cloud computing. Int J Emerg Technol Adv Eng 2(7):95–99
go back to reference Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of Things (IoT) in agriculture – selected aspects. AGRIS on-line Papers in Economics and Informatics, Bd 8, No. 1, S 83–88. ISSN 1804-1930. https://doi.org/10.7160/aol.2016.080108 Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of Things (IoT) in agriculture – selected aspects. AGRIS on-line Papers in Economics and Informatics, Bd 8, No. 1, S 83–88. ISSN 1804-1930. https://​doi.​org/​10.​7160/​aol.​2016.​080108
go back to reference Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th symposium on reliable distributed systems (SRDS). IEEE, S 253–255 Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th symposium on reliable distributed systems (SRDS). IEEE, S 253–255
go back to reference Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In The second USENIX workshop on electronic commerce proceedings, Bd 1, No. 1, Oakland, S 29–40 Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In The second USENIX workshop on electronic commerce proceedings, Bd 1, No. 1, Oakland, S 29–40
go back to reference Weber RH (2009) Internet of things–need for a new legal environment? Comput Law Secur Rev. 25(6):522–527CrossRef Weber RH (2009) Internet of things–need for a new legal environment? Comput Law Secur Rev. 25(6):522–527CrossRef
go back to reference Weber RH (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30CrossRef Weber RH (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30CrossRef
go back to reference Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the internet of things. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), S 171–176CrossRef Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the internet of things. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), S 171–176CrossRef
go back to reference Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork
go back to reference Yewale AJ (2018) Study of blockchain-as-a-service systems with a case study of hyperledger fabric implementation on Kubernetes, Las Vegas Yewale AJ (2018) Study of blockchain-as-a-service systems with a case study of hyperledger fabric implementation on Kubernetes, Las Vegas
go back to reference Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, Emeishan, S 663–667 Zhao K, Ge L (2013) A survey on the internet of things security. In: 2013 Ninth international conference on computational intelligence and security. IEEE, Emeishan, S 663–667
go back to reference Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, San Jose S 180–184 Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, San Jose S 180–184
Metadata
Title
IoT Security Best Practices
Author
Marco Barenkamp
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-658-32439-1_21

Premium Partner