|Reinfurt, Lukas; Breitenbücher, Uwe; Falkenthal, Michael; Fremantle, Paul; Leymann, Frank: Internet of Things Security Patterns. |
In: The Hillside Group (Hrsg): Proceedings of the 24th Conference on Pattern Languages of Programs (PLoP '17).
Universität Stuttgart, Fakultät Informatik, Elektrotechnik und Informationstechnik.
S. 1-28, englisch.
Vancouver: ACM, Oktober 2017.
Artikel in Tagungsband (Konferenz-Beitrag).
|CR-Klassif.||C.2.4 (Distributed Systems)|
D.2.11 (Software Engineering Software Architectures)
D.4.6 (Operating Systems Security and Protection)
|Keywords||Internet of Things; Design Patterns; Cyber-Physical Systems; Security; Privacy|
The Internet of Things (IoT) is growing, with new technologies, standards, devices, platforms, and applications being constantly developed. This has lead to a confusing solution landscape, which makes understanding the various options and choosing a path between them difficult. In order to help with this problem, we have collected IoT Patterns, which are textual descriptions of common problems and their abstract solutions based on repeatedly found real life examples. With this work, we add some security related IoT Patterns to complement the already existing catalog of security patterns that can be applied to IoT systems. The Trusted Communication Partner and Outbound-Only Connection patterns decrease the attack surface of devices. The Permission Control and Personal Zone Hub patterns give device owners control over what happens with their devices and data. The Whitelist and Blacklist patterns control access to and prevent abuse of resources.
|Abteilung(en)||Universität Stuttgart, Institut für Architektur von Anwendungssystemen|
|Eingabedatum||11. Dezember 2018|