Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario
نویسندگان
چکیده
This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملNSF Activities in Cyber Trust
“Cyber Trust” is an umbrella term under which NSF/CISE has organized research focused on improving the ability of a computer-based component or system to repel, resist, detect, or tolerate malicious attacks while providing a desired function. Cyber Trust encompasses security (in terms of secrecy, confidentiality, integrity and availability), as well as privacy, correctness, reliability, safety ...
متن کاملAn Embedded Dynamic Security Networking Technology Based on Quick Jump and Trust
Safe and efficient networking of embedded systems was the integration development bottleneck for the next generation of embedded systems and network systems. In conventional networking technology embedded systems, either the network security or network efficient was ignored, so a better performance cannot be achieved. An embedded dynamic security networking technology based on quick jump and tr...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کامل