Lego methodology approach for common criteria certification of IoT telemetry

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In our days, almost every business relays on medium-to-high performance computer systems which presents the possibility of being the target of different threats that can exploit the vulnerable software, respectively hardware components. The concept of “security risk” can be described as a specific threat that using a specific type of attack presents the ability to exploit system vulnerabilities, action which will affect the entire integrity of the targeted systems. From this point of view, the main idea of this paper is to present a Lego methodology approach for Common Criteria certification that can be applied to IoT Telemetry systems. Furthermore, we present scenarios of implementation of our approach to increase robustness level applied for agro-telemetry system.

Cite

CITATION STYLE

APA

Suciu, G., Istrate, C., Petre, I., & Scheianu, A. (2019). Lego methodology approach for common criteria certification of IoT telemetry. In Advances in Intelligent Systems and Computing (Vol. 931, pp. 165–174). Springer Verlag. https://doi.org/10.1007/978-3-030-16184-2_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free