Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-25504
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHeeb, Zeno-
dc.contributor.authorKalinagac, Onur-
dc.contributor.authorSoussi, Wissem-
dc.contributor.authorGür, Gürkan-
dc.date.accessioned2022-08-25T08:27:46Z-
dc.date.available2022-08-25T08:27:46Z-
dc.date.issued2022-
dc.identifier.isbn978-1-6654-6763-6de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/25504-
dc.description.abstractWith the growing number of IoT (Internet of Things) devices and their particular characteristics compared to traditional systems, incumbent security mechanisms need to be advanced for secure and resilient IoT operation in current ICT systems. One particular standard, which tries to improve IoT security in that regard, is the Manufacturer Usage Description (MUD) by IETF. In this paper, as our main focus is to highlight the security gains of using MUD, we first discuss the critical threats to IoT devices based on available research. In the second step, we analyze the MUD technology to delineate where MUD is beneficial (or not) to address these security issues.de_CH
dc.language.isoende_CH
dc.publisherIEEEde_CH
dc.rightsLicence according to publishing contractde_CH
dc.subjectIoTde_CH
dc.subjectSecurityde_CH
dc.subjectManufacturer Usage Description (MUD)de_CH
dc.subject6G/Beyond 5G networksde_CH
dc.subject.ddc005: Computerprogrammierung, Programme und Datende_CH
dc.titleThe impact of Manufacturer Usage Description (MUD) on IoT securityde_CH
dc.typeKonferenz: Paperde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Angewandte Informationstechnologie (InIT)de_CH
dc.identifier.doi10.1109/6GNet54646.2022.9830354de_CH
dc.identifier.doi10.21256/zhaw-25504-
zhaw.conference.details1st International Conference on 6G Networking (6GNet), Paris, France, 6-8 July 2022de_CH
zhaw.funding.euinfo:eu-repo/grantAgreement/EC/H2020/871808//INtelligent Security and PervasIve tRust for 5G and Beyond/INSPIRE-5Gplusde_CH
zhaw.originated.zhawYesde_CH
zhaw.publication.statusacceptedVersionde_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.title.proceedingsProceedings of the 2022 1st International Conference on 6G Networking (6GNet)de_CH
zhaw.webfeedInformation Securityde_CH
zhaw.funding.zhawINtelligent Security and PervasIve tRust for 5G and Beyond (INSPIRE-5Gplus)de_CH
zhaw.author.additionalNode_CH
zhaw.display.portraitYesde_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
2022_Heeb-etal_MUD-impact-IoT-security.pdfAccepted Version292.75 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.