MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT

Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Ob...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal Vol. 8; no. 10; pp. 7818 - 7832
Main Authors: Navas, Renzo E., Cuppens, Frederic, Boulahia Cuppens, Nora, Toutain, Laurent, Papadopoulos, Georgios Z.
Format: Journal Article
Language:English
Published: Piscataway IEEE 15-05-2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence.
AbstractList Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence.
Author Boulahia Cuppens, Nora
Papadopoulos, Georgios Z.
Navas, Renzo E.
Cuppens, Frederic
Toutain, Laurent
Author_xml – sequence: 1
  givenname: Renzo E.
  orcidid: 0000-0002-8784-7444
  surname: Navas
  fullname: Navas, Renzo E.
  email: renzo.navas@imt-atlantique.fr
  organization: Lab-STICC, UMR CNRS 6285, IMT Atlantique, Rennes, France
– sequence: 2
  givenname: Frederic
  orcidid: 0000-0003-1124-2200
  surname: Cuppens
  fullname: Cuppens, Frederic
  email: frederic.cuppens@polymtl.ca
  organization: Department du Genie Informatique et Genie Logiciel, École Polytechnique de Montréal, Montreal, Canada
– sequence: 3
  givenname: Nora
  orcidid: 0000-0001-8792-0413
  surname: Boulahia Cuppens
  fullname: Boulahia Cuppens, Nora
  email: nora.boulahia-cuppens@polymtl.ca
  organization: Department du Genie Informatique et Genie Logiciel, École Polytechnique de Montréal, Montreal, Canada
– sequence: 4
  givenname: Laurent
  surname: Toutain
  fullname: Toutain, Laurent
  email: laurent.toutain@imt-atlantique.fr
  organization: UMR CNRS 6074, IMT Atlantique, IRISA, Rennes, France
– sequence: 5
  givenname: Georgios Z.
  orcidid: 0000-0002-0331-0579
  surname: Papadopoulos
  fullname: Papadopoulos, Georgios Z.
  email: georgios.papadopoulos@imt-atlantique.fr
  organization: UMR CNRS 6074, IMT Atlantique, IRISA, Rennes, France
BackLink https://hal.science/hal-03088360$$DView record in HAL
BookMark eNpNkE1Lw0AQhhep4OcPEC8LngRbZ2eT7OYkpX5VWgSNeFzW7aRNabN1k1b89ya0FE8zDM_7MjwnrFP6khi7ENATAtLbl-Fr1kNA6EmIQMb6gB2jRNWNkgQ7__Yjdl5VcwBoYrFIk2OWjbP7G_45o0C8H2qezfz6jvf5-29V09LWheNvtCnoh_ucj_2mKKc8s2FKNb-nnMqKeEZuVhbfa6p47gMf-uyMHeZ2UdH5bp6yj8eHbPDcHb0-DQf9UddJBXU3JxRKCgAbfcW502TjyEmMnFbowEI-iWOZoHCWBMUqmaT6ywlQGCUYpRjJU3a97Z3ZhVmFYmnDr_G2MM_9kWlvIEFrmcBGNOzVll0F3_5am7lfh7J5z2CMmILSOm0osaVc8FUVKN_XCjCta9O6Nq1rs3PdZC63mYKI9nyKClAr-QfLa3g0
CODEN IITJAU
CitedBy_id crossref_primary_10_1016_j_cose_2023_103685
crossref_primary_10_3390_app12189230
crossref_primary_10_1109_MIE_2023_3292988
crossref_primary_10_3390_app14010357
crossref_primary_10_1109_ACCESS_2024_3377102
crossref_primary_10_1109_JIOT_2022_3144873
crossref_primary_10_1109_TIFS_2023_3318964
crossref_primary_10_1109_TII_2022_3190556
crossref_primary_10_3390_technologies10030060
crossref_primary_10_3389_friot_2023_1306018
crossref_primary_10_3390_rs16122199
crossref_primary_10_1109_JIOT_2022_3144937
crossref_primary_10_1109_ACCESS_2023_3278744
crossref_primary_10_3390_s22197318
crossref_primary_10_1007_s10207_023_00806_8
crossref_primary_10_1016_j_vehcom_2024_100774
crossref_primary_10_1109_TETC_2022_3197464
crossref_primary_10_3390_s24134369
crossref_primary_10_48084_etasr_4417
crossref_primary_10_1109_JIOT_2024_3354045
crossref_primary_10_1109_TNSM_2022_3177512
crossref_primary_10_1109_TIFS_2024_3402055
crossref_primary_10_3390_electronics10192392
Cites_doi 10.1145/2601248.2601268
10.1007/s11390-019-1906-z
10.1145/3098954.3098975
10.1007/978-3-319-04717-1_14
10.1109/PIMRC.2016.7794800
10.1016/j.cose.2020.101742
10.1109/IEMCON.2018.8614925
10.1145/3054977.3054997
10.1016/j.cose.2017.12.013
10.1109/COMST.2019.2963791
10.1109/ETFA.2013.6648037
10.1109/ICCE.2018.8326298
10.1007/978-3-030-00434-7_7
10.1504/IJCCBS.2013.059053
10.1007/978-1-4614-0977-9
10.1007/978-3-662-53008-5_10
10.1145/3239372.3239393
10.1002/9781119593386.ch24
10.1109/CCCS.2015.7374189
10.1631/FITEE.1601321
10.1016/j.infsof.2018.07.007
10.1109/MC.2017.201
10.1016/j.future.2017.11.022
10.1109/JIOT.2019.2892003
10.1109/ICCAC.2017.18
10.1016/j.jss.2006.07.009
10.1109/ICSSA.2016.7
10.1016/j.future.2017.07.008
10.1109/JSYST.2019.2922589
10.1145/2808475.2808478
10.1109/COMST.2020.2982955
10.1109/JIOT.2019.2961839
10.1145/2937755
10.1109/DISCEX.2001.932214
10.1145/2996890.3007877
10.1109/GIOTS.2019.8766426
10.1109/LWC.2018.2797916
10.1109/i-Society.2014.7009047
10.1109/ICDCS.2015.71
10.1155/2018/3759626
10.1109/MSP.2013.137
10.1109/CNS.2013.6682717
10.1109/JIOT.2019.2943151
10.1145/2602087.2602107
10.1016/j.cose.2018.08.003
10.1016/j.jnca.2017.01.033
10.1109/ISC2.2016.7580756
10.1109/CNS.2014.6997460
10.1145/2663474.2663479
10.1145/2593069.2593218
10.1016/B978-0-12-805395-9.00014-9
10.1016/S0304-3975(98)00075-9
10.1109/IRI.2013.6642449
10.3390/jsan7010012
10.1109/MILCOM.2017.8170748
10.1109/WF-IoT.2016.7845457
10.1201/b19467
10.1145/2663474.2663480
10.1007/978-3-319-40667-1_4
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
VOOES
DOI 10.1109/JIOT.2020.3040358
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library Online
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 7832
ExternalDocumentID oai_HAL_hal_03088360v1
10_1109_JIOT_2020_3040358
9270287
Genre orig-research
GroupedDBID 0R~
6IK
97E
AAJGR
AASAJ
ABQJQ
ABVLG
AKJIK
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
RIG
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
VOOES
ID FETCH-LOGICAL-c370t-fe2173100a4b5fc8ea54c324c872c0a0fd553621cae1e576d98bc107246249243
IEDL.DBID RIE
ISSN 2327-4662
2372-2541
IngestDate Wed Sep 18 06:58:01 EDT 2024
Thu Oct 10 18:05:50 EDT 2024
Fri Aug 23 03:58:52 EDT 2024
Wed Jun 26 19:26:55 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 10
Keywords Measurement
Moving Target Defense
Metrics
Systematics
Cyber Security
Bibliographies
Taxonomy
Systematic Literature Review
Entropy
Internet of Things
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c370t-fe2173100a4b5fc8ea54c324c872c0a0fd553621cae1e576d98bc107246249243
ORCID 0000-0002-8784-7444
0000-0003-1124-2200
0000-0001-8792-0413
0000-0002-0331-0579
0000-0001-9038-499X
OpenAccessLink https://hal.science/hal-03088360
PQID 2522907889
PQPubID 2040421
PageCount 15
ParticipantIDs hal_primary_oai_HAL_hal_03088360v1
crossref_primary_10_1109_JIOT_2020_3040358
proquest_journals_2522907889
ieee_primary_9270287
PublicationCentury 2000
PublicationDate 2021-05-15
PublicationDateYYYYMMDD 2021-05-15
PublicationDate_xml – month: 05
  year: 2021
  text: 2021-05-15
  day: 15
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
ref56
ref12
ref59
ref58
ref14
ref53
ref52
ref55
ref11
ref54
ref10
ref17
ref16
ref19
hobson (ref20) 2014
ge (ref45) 2017; 83
ref50
ref46
ghosh (ref4) 2009
puthal (ref51) 2015
ref48
abbasi (ref30) 2019
ref47
ref42
ref41
ref44
ref43
ref49
ref8
saulles (ref1) 2019
ref7
ref9
ref3
tesla (ref15) 1903
ref6
ward (ref5) 2018
ref40
ref35
ref34
ref37
ref36
ref31
kouachi (ref67) 2019
ref33
ref32
ref2
ref39
ref38
ref71
(ref18) 2010
picek (ref23) 2017
navas (ref70) 2020
ref68
ref24
ref26
ref69
ref25
ref64
ref63
ref66
ref65
ref21
ref28
zhuang (ref22) 2015
ref27
ref29
itkis (ref62) 2002
ref60
ref61
References_xml – start-page: 115
  year: 2017
  ident: ref23
  article-title: If you can't measure it, you can't improve it: Moving target defense metrics
  publication-title: Proc Workshop Moving Target Defense
  contributor:
    fullname: picek
– ident: ref31
  doi: 10.1145/2601248.2601268
– ident: ref9
  doi: 10.1007/s11390-019-1906-z
– ident: ref50
  doi: 10.1145/3098954.3098975
– ident: ref32
  doi: 10.1007/978-3-319-04717-1_14
– ident: ref53
  doi: 10.1109/PIMRC.2016.7794800
– year: 2009
  ident: ref4
  article-title: Moving target defense co-chair's report-national cyber leap year summit 2009
  contributor:
    fullname: ghosh
– ident: ref26
  doi: 10.1016/j.cose.2020.101742
– ident: ref47
  doi: 10.1109/IEMCON.2018.8614925
– ident: ref35
  doi: 10.1145/3054977.3054997
– year: 2010
  ident: ref18
  publication-title: NITRD CSIA IWG Cybersecurity Game-Change Research & Development Recommendation[R]
– ident: ref25
  doi: 10.1016/j.cose.2017.12.013
– ident: ref11
  doi: 10.1109/COMST.2019.2963791
– ident: ref69
  doi: 10.1109/ETFA.2013.6648037
– ident: ref55
  doi: 10.1109/ICCE.2018.8326298
– ident: ref61
  doi: 10.1007/978-3-030-00434-7_7
– ident: ref33
  doi: 10.1504/IJCCBS.2013.059053
– ident: ref19
  doi: 10.1007/978-1-4614-0977-9
– ident: ref60
  doi: 10.1007/978-3-662-53008-5_10
– start-page: 93
  year: 2015
  ident: ref51
  article-title: A dynamic key length based approach for real-time security verification of big sensing data stream
  publication-title: Proc Int Conf Web Inf Syst Eng
  contributor:
    fullname: puthal
– ident: ref57
  doi: 10.1145/3239372.3239393
– ident: ref12
  doi: 10.1002/9781119593386.ch24
– ident: ref37
  doi: 10.1109/CCCS.2015.7374189
– year: 2019
  ident: ref1
  publication-title: IoT Statistics-Information Matters
  contributor:
    fullname: saulles
– ident: ref7
  doi: 10.1631/FITEE.1601321
– ident: ref27
  doi: 10.1016/j.infsof.2018.07.007
– ident: ref2
  doi: 10.1109/MC.2017.201
– ident: ref3
  doi: 10.1016/j.future.2017.11.022
– ident: ref48
  doi: 10.1109/JIOT.2019.2892003
– year: 2015
  ident: ref22
  article-title: A theory for understanding and quantifying moving target defense (doctoral dissertation)
  contributor:
    fullname: zhuang
– ident: ref66
  doi: 10.1109/ICCAC.2017.18
– ident: ref13
  doi: 10.1016/j.jss.2006.07.009
– ident: ref39
  doi: 10.1109/ICSSA.2016.7
– ident: ref46
  doi: 10.1016/j.future.2017.07.008
– start-page: 1
  year: 2020
  ident: ref70
  article-title: IANVS: A moving target defense framework for a resilient Internet of Things
  publication-title: Proc IEEE Symp Comput Commun (ISCC)
  contributor:
    fullname: navas
– ident: ref59
  doi: 10.1109/JSYST.2019.2922589
– start-page: 1
  year: 2019
  ident: ref67
  article-title: Per packet flow anonymization in 6LoWPAN IoT networks
  publication-title: Proc Int Conf Wireless Netw Mobile Commun (WINCOM)
  contributor:
    fullname: kouachi
– year: 2018
  ident: ref5
  article-title: Survey of cyber moving targets second edition
  contributor:
    fullname: ward
– ident: ref21
  doi: 10.1145/2808475.2808478
– ident: ref10
  doi: 10.1109/COMST.2020.2982955
– ident: ref54
  doi: 10.1109/JIOT.2019.2961839
– ident: ref52
  doi: 10.1145/2937755
– ident: ref16
  doi: 10.1109/DISCEX.2001.932214
– year: 1903
  ident: ref15
  article-title: System of signaling
  contributor:
    fullname: tesla
– ident: ref40
  doi: 10.1145/2996890.3007877
– ident: ref58
  doi: 10.1109/GIOTS.2019.8766426
– ident: ref36
  doi: 10.1109/LWC.2018.2797916
– ident: ref34
  doi: 10.1109/i-Society.2014.7009047
– ident: ref65
  doi: 10.1109/ICDCS.2015.71
– ident: ref8
  doi: 10.1155/2018/3759626
– start-page: 102
  year: 2002
  ident: ref62
  article-title: Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions
  publication-title: Proc Int Conf Security Commun Netw
  contributor:
    fullname: itkis
– ident: ref6
  doi: 10.1109/MSP.2013.137
– ident: ref63
  doi: 10.1109/CNS.2013.6682717
– ident: ref49
  doi: 10.1109/JIOT.2019.2943151
– start-page: 31
  year: 2019
  ident: ref30
  article-title: Challenges in designing exploit mitigations for deeply embedded systems
  publication-title: Proc IEEE Eur Symp Security Privacy (EuroS&P)
  contributor:
    fullname: abbasi
– ident: ref28
  doi: 10.1145/2602087.2602107
– ident: ref24
  doi: 10.1016/j.cose.2018.08.003
– volume: 83
  start-page: 12
  year: 2017
  ident: ref45
  article-title: A framework for automating security analysis of the Internet of Things
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2017.01.033
  contributor:
    fullname: ge
– ident: ref56
  doi: 10.1109/ISC2.2016.7580756
– ident: ref64
  doi: 10.1109/CNS.2014.6997460
– ident: ref17
  doi: 10.1145/2663474.2663479
– ident: ref43
  doi: 10.1145/2593069.2593218
– ident: ref38
  doi: 10.1016/B978-0-12-805395-9.00014-9
– ident: ref71
  doi: 10.1016/S0304-3975(98)00075-9
– ident: ref29
  doi: 10.1109/IRI.2013.6642449
– ident: ref41
  doi: 10.3390/jsan7010012
– ident: ref44
  doi: 10.1109/MILCOM.2017.8170748
– ident: ref42
  doi: 10.1109/WF-IoT.2016.7845457
– ident: ref14
  doi: 10.1201/b19467
– start-page: 41
  year: 2014
  ident: ref20
  article-title: On the challenges of effective movement
  publication-title: Proc 1st ACM Workshop Moving Target Defense
  doi: 10.1145/2663474.2663480
  contributor:
    fullname: hobson
– ident: ref68
  doi: 10.1007/978-3-319-40667-1_4
SSID ssj0001105196
Score 2.4167805
Snippet Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems....
Context: Internet of Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems....
SourceID hal
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Publisher
StartPage 7818
SubjectTerms Bibliographies
Computer Science
Cryptography and Security
Cyber security
Cybersecurity
Entropy
Entropy (Information theory)
Feasibility
Foundations
Internet of Things
Internet of Things (IoT)
Literature reviews
Measurement
metrics
moving target defense (MTD)
Moving targets
Networking and Internet Architecture
Proposals
Security
systematic literature review
Systematics
Taxonomy
Title MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT
URI https://ieeexplore.ieee.org/document/9270287
https://www.proquest.com/docview/2522907889
https://hal.science/hal-03088360
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDLXYTlwYMBCDgSLECa2sH8mantDENm2IwWFF4lalqStOK9oHvx-76wYSXLhVVSpVeUns59jPADeRTr2UqAbREm0cNgGORmucIDAmyFSgJHJx8ngWPr_pwZBlcjq7WhhELJPP8I4fy7v8rLBrDpV1Iy6e0mENamGkN7Va3_EUj52RXnVx6blR93HyEhMB9ImX0koNuKn7D9NTe-fEx7Kjyq9juLQto8b__uoQDiofUvQ3oB_BHs6PobHtzyCq7dqEeBoPOoKO2wXyYBG_F-t70ReznXqz2FwNiCIX0zK0IOIyM1wMMCd-iyLeSrwuBXm3YlLEJ_A6GsYPY6fqouDYIHRXTo7EOjiMb2TKCVtolLTkRlkd-tY1bp4pRVbMswY9JPaREXyWSKEve6wmKINTqM-LOZ6BIG88DWWuUUpfaitTl6Vy_NxVrocGVQtutxOcfGzEMpKSZLhRwmgkjEZSodGCa4JgN45lrsf9p4TfsYYOF5d8ei1o8oTvRlVz3YL2FrGk2nPLxFesXU-UPjr_-6sL2Pc5I4W1V1Ub6qvFGi-htszWV-Va-gI_DcP3
link.rule.ids 230,315,782,786,798,887,27933,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDLXYOMCFb8RgQIQ4IQr9SNb2hCYG2mCDA0HiFqWpK04rYozfj911Awku3Koqlaq8JPZz7GeA0zTJgoyoBtGSxHpsArwEnfWiyNooV5GSyMXJ_af44SXp3bBMzvmiFgYRq-QzvODH6i4_L92UQ2WXKRdPJXEDlpWMO_GsWus7ohKwO9Kpry4DP728GzxqooAhMVNaqxG3df9hfBqvnPpY9VT5dRBX1uV2_X__tQFrtRcpujPYN2EJx1uwPu_QIOoNuw16pHvngg7cd-TBQr-W0yvRFU8L_WYxuxwQZSFGVXBB6Co3XPSwIIaLQs9FXieC_FsxKPUOPN_e6Ou-V_dR8FwU-x9egcQ7OJBvZcYpW2iVdORIuSQOnW_9IleK7FjgLAZI_CMnAB3RwlB2WE9QRrvQHJdj3ANB_ngWyyJBKUOZOJn5LJYTFr7yA7SoWnA2n2DzNpPLMBXN8FPDaBhGw9RotOCEIFiMY6Hrfndo-B2r6HB5yWfQgm2e8MWoeq5b0J4jZupdNzGhYvV6IvXp_t9fHcNKX4-GZjh4uD-A1ZDzU1iJVbWh-fE-xUNoTPLpUbWuvgC888dI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MTD%2C+Where+Art+Thou%3F+A+Systematic+Review+of+Moving+Target+Defense+Techniques+for+IoT&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Navas%2C+Renzo+E.&rft.au=Cuppens%2C+Frederic&rft.au=Boulahia+Cuppens%2C+Nora&rft.au=Toutain%2C+Laurent&rft.date=2021-05-15&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=8&rft.issue=10&rft.spage=7818&rft.epage=7832&rft_id=info:doi/10.1109%2FJIOT.2020.3040358&rft.externalDocID=9270287
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon