An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime moni...
The widespread diffusion of ubiquitous and smart devices is radically changing the environment surro...
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial a...
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices ha...
Graphical IoT device management platforms, such as IoTtalk, make it easy to describe interactions be...
peer reviewedThe growth in IoT will far exceed that of other connected devices. In contrast to the r...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
International audienceInternet of Things (IoT) enables a myriad of applications by interconnecting s...
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In add...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
The Internet of Things (IoT) is shaped by the increasing number of low-cost Internet-connected embed...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Remote attestation has emerged as a powerful security mechanism that ascertains the legitimate opera...
When in the old days the Internet consisted mostly of workstations, servers, mainframes and networki...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
The widespread diffusion of ubiquitous and smart devices is radically changing the environment surro...
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial a...
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices ha...
Graphical IoT device management platforms, such as IoTtalk, make it easy to describe interactions be...
peer reviewedThe growth in IoT will far exceed that of other connected devices. In contrast to the r...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
International audienceInternet of Things (IoT) enables a myriad of applications by interconnecting s...
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In add...
The Internet of Things has a bootloader and applications responsible for initializing the device’s h...
The Internet of Things (IoT) is shaped by the increasing number of low-cost Internet-connected embed...
The Internet of things (IoT) are increasingly exposed to a wide range of security threats. Despite t...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
Remote attestation has emerged as a powerful security mechanism that ascertains the legitimate opera...
When in the old days the Internet consisted mostly of workstations, servers, mainframes and networki...
Internet of Things (IoT) applications are being rapidly deployed in the context of smart homes, auto...
The widespread diffusion of ubiquitous and smart devices is radically changing the environment surro...
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial a...
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices ha...