Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Lola, J., Serrão, C. & Casal, J. (2023). Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system. Electronics. 12
Exportar Referência (IEEE)
J. Lola et al.,  "Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system", in Electronics, vol. 12, 2023
Exportar BibTeX
@article{lola2023_1715401761288,
	author = "Lola, J. and Serrão, C. and Casal, J.",
	title = "Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system",
	journal = "Electronics",
	year = "2023",
	volume = "12",
	number = "",
	doi = "10.3390/electronics12122589",
	url = "https://www.mdpi.com/2079-9292/12/12/2589"
}
Exportar RIS
TY  - JOUR
TI  - Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system
T2  - Electronics
VL  - 12
AU  - Lola, J.
AU  - Serrão, C.
AU  - Casal, J.
PY  - 2023
SN  - 2079-9292
DO  - 10.3390/electronics12122589
UR  - https://www.mdpi.com/2079-9292/12/12/2589
AB  - In recent years, we have seen a growing wave in the integration of IoT (Internet of Things) technologies into society. This has created new opportunities, but at the same time given rise to several critical issues, creating new challenges that need to be addressed. One of the main challenges is the security and privacy of information that is processed by IoT devices in our daily lives. Users are, most of the time, unaware of IoT devices’ personal information collection and transmission activities that affect their security and privacy. In this work, we propose a solution that aims to increase the privacy and security of data in IoT devices, through a system that controls the IoT device’s communication on the network. This system is based on two basic and simple principles. First, the IoT device manufacturer declares their device’s data collection intentions. Second, the user declares their own preferences of what is permitted to the IoT device. The design of the system includes tools capable of analyzing packets sent by IoT devices and applying network traffic control rules. The objective is to allow the declaration and verification of communication intentions of IoT devices and control the communication of such devices to detect potential security and privacy violations. We have created a test-bed to validate the developed solution, based on virtual machines, and we concluded that our system has little impact on how the overall system performed.
ER  -