Paper
31 December 2018 On demand secure isolation using security models for different system management platforms
George Suciu, Cristiana Istrate, Ana Petrache, David Schlachet, Tony Buteau
Author Affiliations +
Proceedings Volume 10977, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX; 109770R (2018) https://doi.org/10.1117/12.2324942
Event: Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies IX, 2018, Constanta, Romania
Abstract
System management defines the organization of information technology frameworks in a business data center. To be effective, a system management plan needs to deliver at their best the IT as a Service (ITaaS) and to allow the employees to respond in a rapid manner to the changing environment of a company. However, system management platforms deal with security breaches. Henceforth, the purpose of this paper is to present a solution that, with the aid of security models, there can be implemented a secure isolation. The designed security breach focuses the wireless communication protocols, showing that a Wi-Fi password can be hacked using a specialized software, such as Kali Linux. The analysis has been done on a well-known protocol used in Internet of Things (IoT) device management, called Lightweight Machine to Machine (LwM2M). For securely using LwM2M within a virtualized environment, On Demand Secure Isolation (ODSI) proposes Kali Linux for LwM2M's security bugs, as well as a solution for system management protection. The chosen security models that will be described are the Network Manager, the Keyring Manager and the Administration Manager.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
George Suciu, Cristiana Istrate, Ana Petrache, David Schlachet, and Tony Buteau "On demand secure isolation using security models for different system management platforms", Proc. SPIE 10977, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX, 109770R (31 December 2018); https://doi.org/10.1117/12.2324942
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Network security

Control systems

Wireless communications

Sensor networks

Information security

Internet

RELATED CONTENT


Back to Top