|Bibliography||Reinfurt, Lukas; Breitenbücher, Uwe; Falkenthal, Michael; Fremantle, Paul; Leymann, Frank: Internet of Things Security Patterns. |
In: The Hillside Group (ed.): Proceedings of the 24th Conference on Pattern Languages of Programs (PLoP '17).
University of Stuttgart, Faculty of Computer Science, Electrical Engineering, and Information Technology.
pp. 1-28, english.
Vancouver: ACM, October 2017.
Article in Proceedings (Conference Paper).
|CR-Schema||C.2.4 (Distributed Systems)|
D.2.11 (Software Engineering Software Architectures)
D.4.6 (Operating Systems Security and Protection)
|Keywords||Internet of Things; Design Patterns; Cyber-Physical Systems; Security; Privacy|
The Internet of Things (IoT) is growing, with new technologies, standards, devices, platforms, and applications being constantly developed. This has lead to a confusing solution landscape, which makes understanding the various options and choosing a path between them difficult. In order to help with this problem, we have collected IoT Patterns, which are textual descriptions of common problems and their abstract solutions based on repeatedly found real life examples. With this work, we add some security related IoT Patterns to complement the already existing catalog of security patterns that can be applied to IoT systems. The Trusted Communication Partner and Outbound-Only Connection patterns decrease the attack surface of devices. The Permission Control and Personal Zone Hub patterns give device owners control over what happens with their devices and data. The Whitelist and Blacklist patterns control access to and prevent abuse of resources.
|Department(s)||University of Stuttgart, Institute of Architecture of Application Systems|
|Entry date||December 11, 2018|