With the strong development of the Internet of Things (IoT), the definition of IoT devices' intended behavior is key for an effective detection of potential cybersecurity attacks and threats in an increasingly connected environment. In 2019, the Manufacturer Usage Description (MUD) was standardized within the IETF as a data model and architecture for defining, obtaining and deploying MUD files, which describe the network behavioral profiles of IoT devices. While it has attracted a strong interest from academia, industry, and Standards Developing Organizations (SDOs), MUD is not yet widely deployed in real-world scenarios. In this work, we analyze the current research landscape around this standard, and describe some of the main challenges t...
The Internet of Things (IoT) is, simply put, the concept of connecting any network enabled device to...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...
With the strong development of the Internet of Things (IoT), the definition of IoT devices’ i...
With the strong development of the Internet of Things (IoT), the definition of IoT devices' intended...
With the growing number of IoT (Internet of Things) devices and their particular characteristics com...
With the growing number of IoT (Internet of Things) devices and their particular characteristics com...
IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the ...
Targeted data breaches and cybersecurity attacks involving IoT devices are becoming ever more concer...
While the growing development of paradigms such as the 5G or the Internet of Things (IoT) enlarges t...
oT usage has shown significant growth in the past decades. A major target for theIoT market is the ...
The growth of Internet of things (IoT) devices is increasing dramatically. IoT devices often have m...
Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world...
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected de...
Techniques are described herein for extending Manufacturer Usage Descriptions (MUD) to onboard Inter...
The Internet of Things (IoT) is, simply put, the concept of connecting any network enabled device to...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...
With the strong development of the Internet of Things (IoT), the definition of IoT devices’ i...
With the strong development of the Internet of Things (IoT), the definition of IoT devices' intended...
With the growing number of IoT (Internet of Things) devices and their particular characteristics com...
With the growing number of IoT (Internet of Things) devices and their particular characteristics com...
IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the ...
Targeted data breaches and cybersecurity attacks involving IoT devices are becoming ever more concer...
While the growing development of paradigms such as the 5G or the Internet of Things (IoT) enlarges t...
oT usage has shown significant growth in the past decades. A major target for theIoT market is the ...
The growth of Internet of things (IoT) devices is increasing dramatically. IoT devices often have m...
Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world...
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected de...
Techniques are described herein for extending Manufacturer Usage Descriptions (MUD) to onboard Inter...
The Internet of Things (IoT) is, simply put, the concept of connecting any network enabled device to...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
The Internet of Things (IoT) consists of resource-constrained devices (e.g., sensors and actuators) ...