All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Protecting IoT Devices with Software-Defined Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216275%3A25530%2F21%3A39917328" target="_blank" >RIV/00216275:25530/21:39917328 - isvavai.cz</a>

  • Result on the web

    <a href="https://link.springer.com/chapter/10.1007%2F978-3-030-71711-7_4" target="_blank" >https://link.springer.com/chapter/10.1007%2F978-3-030-71711-7_4</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-030-71711-7_4" target="_blank" >10.1007/978-3-030-71711-7_4</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Protecting IoT Devices with Software-Defined Networks

  • Original language description

    The use of IoT devices is becoming more frequent in modern networks, such as Smart Grids, Smart Cities, and Smart Homes. These deployments are experiencing a massive boom, but they often lack proper security mechanisms. This is caused mostly by limited computing capabilities and simplified operating systems of IoT devices. A viable approach of protection of these devices is a communication network. While traditional networks can be used for protection of IoT devices, they are inflexible, costly, vendor-specific, and hard to manage. This paper describes use of software-defined networking - a modern concept of communication networks - for protecting IoT devices. Typical threats of IoT devices are described in addition to possible protection mechanisms of traditional networks. Consequently, protection techniques based on software-defined networks are proposed for the same threats where applicable. These techniques are based on the IEC’s five-step protection methodology. Finally, selected protection techniques are verified on a use case application of a typical network connecting IoT devices.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    Communications in Computer and Information Science. Vol. 1382

  • ISBN

    978-3-030-71710-0

  • Number of pages of the result

    12

  • Pages from-to

    41-52

  • Number of pages of the book

    423

  • Publisher name

    Springer Nature Switzerland AG

  • Place of publication

    Cham

  • UT code for WoS chapter