Securing Node-RED Applications

نویسندگان

چکیده

Trigger-Action Platforms (TAPs) play a vital role in fulfilling the promise of Internet Things (IoT) by seamlessly connecting otherwise unconnected devices and services. While enabling novel exciting applications across variety services, security privacy issues must be taken into consideration because TAPs essentially act as persons-in-the-middle between trigger action The issue is further aggravated since triggers actions on are mostly provided third parties extending trust beyond platform providers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the Node of an Active Network

Active networks aim to provide a software framework that enables network applications to customize the processing of their communications. Security is of critical importance to the success of active networking. This paper discusses the design of securing the node of an active network using active networking principles. The secure node architecture includes an Active Node Operating System Securi...

متن کامل

Securing Mobile Applications

W idespread mobile device use has stimulated a rich market for applications. Many apps, however, reveal sensitive user information such as location, movements, and habits1 and/or spread malware.2 Network anonymization techniques alone don’t ensure privacy because the OS together with the invoked mobile apps might still release information that reidentifies users or devices. Even when users are ...

متن کامل

Securing Collaborative Applications

Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any time and from any location. Increasingly capable mobile platforms and rich, new applications are enabling users to communicate and collaborate anytime and anywhere. However, concerns about the security and reliability o...

متن کامل

Securing MANET against Wormhole Attack using Neighbor Node Analysis

In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...

متن کامل

Securing RFID Applications: Issues, Methods, and Controls

adio frequency identification (RFID) is an automatic identification (autoID) technology developed by the Auto-ID Center at the Massachusetts Institute of Technology, relying on storing and remotely retrieving data using devices called RFID tags and readers (Auto-ID Center, 2002; Doyle, 2004; EPC, 2004b; Finkenzeller, 2000; Shepard, 2005). With RFID technology, physical assets will have embedded...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-91631-2_1