MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Ob...
Saved in:
Published in: | IEEE internet of things journal Vol. 8; no. 10; pp. 7818 - 7832 |
---|---|
Main Authors: | , , , , |
Format: | Journal Article |
Language: | English |
Published: |
Piscataway
IEEE
15-05-2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence. |
---|---|
AbstractList | Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence. |
Author | Boulahia Cuppens, Nora Papadopoulos, Georgios Z. Navas, Renzo E. Cuppens, Frederic Toutain, Laurent |
Author_xml | – sequence: 1 givenname: Renzo E. orcidid: 0000-0002-8784-7444 surname: Navas fullname: Navas, Renzo E. email: renzo.navas@imt-atlantique.fr organization: Lab-STICC, UMR CNRS 6285, IMT Atlantique, Rennes, France – sequence: 2 givenname: Frederic orcidid: 0000-0003-1124-2200 surname: Cuppens fullname: Cuppens, Frederic email: frederic.cuppens@polymtl.ca organization: Department du Genie Informatique et Genie Logiciel, École Polytechnique de Montréal, Montreal, Canada – sequence: 3 givenname: Nora orcidid: 0000-0001-8792-0413 surname: Boulahia Cuppens fullname: Boulahia Cuppens, Nora email: nora.boulahia-cuppens@polymtl.ca organization: Department du Genie Informatique et Genie Logiciel, École Polytechnique de Montréal, Montreal, Canada – sequence: 4 givenname: Laurent surname: Toutain fullname: Toutain, Laurent email: laurent.toutain@imt-atlantique.fr organization: UMR CNRS 6074, IMT Atlantique, IRISA, Rennes, France – sequence: 5 givenname: Georgios Z. orcidid: 0000-0002-0331-0579 surname: Papadopoulos fullname: Papadopoulos, Georgios Z. email: georgios.papadopoulos@imt-atlantique.fr organization: UMR CNRS 6074, IMT Atlantique, IRISA, Rennes, France |
BackLink | https://hal.science/hal-03088360$$DView record in HAL |
BookMark | eNpNkE1Lw0AQhhep4OcPEC8LngRbZ2eT7OYkpX5VWgSNeFzW7aRNabN1k1b89ya0FE8zDM_7MjwnrFP6khi7ENATAtLbl-Fr1kNA6EmIQMb6gB2jRNWNkgQ7__Yjdl5VcwBoYrFIk2OWjbP7G_45o0C8H2qezfz6jvf5-29V09LWheNvtCnoh_ucj_2mKKc8s2FKNb-nnMqKeEZuVhbfa6p47gMf-uyMHeZ2UdH5bp6yj8eHbPDcHb0-DQf9UddJBXU3JxRKCgAbfcW502TjyEmMnFbowEI-iWOZoHCWBMUqmaT6ywlQGCUYpRjJU3a97Z3ZhVmFYmnDr_G2MM_9kWlvIEFrmcBGNOzVll0F3_5am7lfh7J5z2CMmILSOm0osaVc8FUVKN_XCjCta9O6Nq1rs3PdZC63mYKI9nyKClAr-QfLa3g0 |
CODEN | IITJAU |
CitedBy_id | crossref_primary_10_1016_j_cose_2023_103685 crossref_primary_10_3390_app12189230 crossref_primary_10_1109_MIE_2023_3292988 crossref_primary_10_3390_app14010357 crossref_primary_10_1109_ACCESS_2024_3377102 crossref_primary_10_1109_JIOT_2022_3144873 crossref_primary_10_1109_TIFS_2023_3318964 crossref_primary_10_1109_TII_2022_3190556 crossref_primary_10_3390_technologies10030060 crossref_primary_10_3389_friot_2023_1306018 crossref_primary_10_3390_rs16122199 crossref_primary_10_1109_JIOT_2022_3144937 crossref_primary_10_1109_ACCESS_2023_3278744 crossref_primary_10_3390_s22197318 crossref_primary_10_1007_s10207_023_00806_8 crossref_primary_10_1016_j_vehcom_2024_100774 crossref_primary_10_1109_TETC_2022_3197464 crossref_primary_10_3390_s24134369 crossref_primary_10_48084_etasr_4417 crossref_primary_10_1109_JIOT_2024_3354045 crossref_primary_10_1109_TNSM_2022_3177512 crossref_primary_10_1109_TIFS_2024_3402055 crossref_primary_10_3390_electronics10192392 |
Cites_doi | 10.1145/2601248.2601268 10.1007/s11390-019-1906-z 10.1145/3098954.3098975 10.1007/978-3-319-04717-1_14 10.1109/PIMRC.2016.7794800 10.1016/j.cose.2020.101742 10.1109/IEMCON.2018.8614925 10.1145/3054977.3054997 10.1016/j.cose.2017.12.013 10.1109/COMST.2019.2963791 10.1109/ETFA.2013.6648037 10.1109/ICCE.2018.8326298 10.1007/978-3-030-00434-7_7 10.1504/IJCCBS.2013.059053 10.1007/978-1-4614-0977-9 10.1007/978-3-662-53008-5_10 10.1145/3239372.3239393 10.1002/9781119593386.ch24 10.1109/CCCS.2015.7374189 10.1631/FITEE.1601321 10.1016/j.infsof.2018.07.007 10.1109/MC.2017.201 10.1016/j.future.2017.11.022 10.1109/JIOT.2019.2892003 10.1109/ICCAC.2017.18 10.1016/j.jss.2006.07.009 10.1109/ICSSA.2016.7 10.1016/j.future.2017.07.008 10.1109/JSYST.2019.2922589 10.1145/2808475.2808478 10.1109/COMST.2020.2982955 10.1109/JIOT.2019.2961839 10.1145/2937755 10.1109/DISCEX.2001.932214 10.1145/2996890.3007877 10.1109/GIOTS.2019.8766426 10.1109/LWC.2018.2797916 10.1109/i-Society.2014.7009047 10.1109/ICDCS.2015.71 10.1155/2018/3759626 10.1109/MSP.2013.137 10.1109/CNS.2013.6682717 10.1109/JIOT.2019.2943151 10.1145/2602087.2602107 10.1016/j.cose.2018.08.003 10.1016/j.jnca.2017.01.033 10.1109/ISC2.2016.7580756 10.1109/CNS.2014.6997460 10.1145/2663474.2663479 10.1145/2593069.2593218 10.1016/B978-0-12-805395-9.00014-9 10.1016/S0304-3975(98)00075-9 10.1109/IRI.2013.6642449 10.3390/jsan7010012 10.1109/MILCOM.2017.8170748 10.1109/WF-IoT.2016.7845457 10.1201/b19467 10.1145/2663474.2663480 10.1007/978-3-319-40667-1_4 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 1XC VOOES |
DOI | 10.1109/JIOT.2020.3040358 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2327-4662 |
EndPage | 7832 |
ExternalDocumentID | oai_HAL_hal_03088360v1 10_1109_JIOT_2020_3040358 9270287 |
Genre | orig-research |
GroupedDBID | 0R~ 6IK 97E AAJGR AASAJ ABQJQ ABVLG AKJIK ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE RIG AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D 1XC VOOES |
ID | FETCH-LOGICAL-c370t-fe2173100a4b5fc8ea54c324c872c0a0fd553621cae1e576d98bc107246249243 |
IEDL.DBID | RIE |
ISSN | 2327-4662 2372-2541 |
IngestDate | Wed Sep 18 06:58:01 EDT 2024 Thu Oct 10 18:05:50 EDT 2024 Fri Aug 23 03:58:52 EDT 2024 Wed Jun 26 19:26:55 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 10 |
Keywords | Measurement Moving Target Defense Metrics Systematics Cyber Security Bibliographies Taxonomy Systematic Literature Review Entropy Internet of Things |
Language | English |
License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c370t-fe2173100a4b5fc8ea54c324c872c0a0fd553621cae1e576d98bc107246249243 |
ORCID | 0000-0002-8784-7444 0000-0003-1124-2200 0000-0001-8792-0413 0000-0002-0331-0579 0000-0001-9038-499X |
OpenAccessLink | https://hal.science/hal-03088360 |
PQID | 2522907889 |
PQPubID | 2040421 |
PageCount | 15 |
ParticipantIDs | hal_primary_oai_HAL_hal_03088360v1 crossref_primary_10_1109_JIOT_2020_3040358 proquest_journals_2522907889 ieee_primary_9270287 |
PublicationCentury | 2000 |
PublicationDate | 2021-05-15 |
PublicationDateYYYYMMDD | 2021-05-15 |
PublicationDate_xml | – month: 05 year: 2021 text: 2021-05-15 day: 15 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE internet of things journal |
PublicationTitleAbbrev | JIoT |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref57 ref13 ref56 ref12 ref59 ref58 ref14 ref53 ref52 ref55 ref11 ref54 ref10 ref17 ref16 ref19 hobson (ref20) 2014 ge (ref45) 2017; 83 ref50 ref46 ghosh (ref4) 2009 puthal (ref51) 2015 ref48 abbasi (ref30) 2019 ref47 ref42 ref41 ref44 ref43 ref49 ref8 saulles (ref1) 2019 ref7 ref9 ref3 tesla (ref15) 1903 ref6 ward (ref5) 2018 ref40 ref35 ref34 ref37 ref36 ref31 kouachi (ref67) 2019 ref33 ref32 ref2 ref39 ref38 ref71 (ref18) 2010 picek (ref23) 2017 navas (ref70) 2020 ref68 ref24 ref26 ref69 ref25 ref64 ref63 ref66 ref65 ref21 ref28 zhuang (ref22) 2015 ref27 ref29 itkis (ref62) 2002 ref60 ref61 |
References_xml | – start-page: 115 year: 2017 ident: ref23 article-title: If you can't measure it, you can't improve it: Moving target defense metrics publication-title: Proc Workshop Moving Target Defense contributor: fullname: picek – ident: ref31 doi: 10.1145/2601248.2601268 – ident: ref9 doi: 10.1007/s11390-019-1906-z – ident: ref50 doi: 10.1145/3098954.3098975 – ident: ref32 doi: 10.1007/978-3-319-04717-1_14 – ident: ref53 doi: 10.1109/PIMRC.2016.7794800 – year: 2009 ident: ref4 article-title: Moving target defense co-chair's report-national cyber leap year summit 2009 contributor: fullname: ghosh – ident: ref26 doi: 10.1016/j.cose.2020.101742 – ident: ref47 doi: 10.1109/IEMCON.2018.8614925 – ident: ref35 doi: 10.1145/3054977.3054997 – year: 2010 ident: ref18 publication-title: NITRD CSIA IWG Cybersecurity Game-Change Research & Development Recommendation[R] – ident: ref25 doi: 10.1016/j.cose.2017.12.013 – ident: ref11 doi: 10.1109/COMST.2019.2963791 – ident: ref69 doi: 10.1109/ETFA.2013.6648037 – ident: ref55 doi: 10.1109/ICCE.2018.8326298 – ident: ref61 doi: 10.1007/978-3-030-00434-7_7 – ident: ref33 doi: 10.1504/IJCCBS.2013.059053 – ident: ref19 doi: 10.1007/978-1-4614-0977-9 – ident: ref60 doi: 10.1007/978-3-662-53008-5_10 – start-page: 93 year: 2015 ident: ref51 article-title: A dynamic key length based approach for real-time security verification of big sensing data stream publication-title: Proc Int Conf Web Inf Syst Eng contributor: fullname: puthal – ident: ref57 doi: 10.1145/3239372.3239393 – ident: ref12 doi: 10.1002/9781119593386.ch24 – ident: ref37 doi: 10.1109/CCCS.2015.7374189 – year: 2019 ident: ref1 publication-title: IoT Statistics-Information Matters contributor: fullname: saulles – ident: ref7 doi: 10.1631/FITEE.1601321 – ident: ref27 doi: 10.1016/j.infsof.2018.07.007 – ident: ref2 doi: 10.1109/MC.2017.201 – ident: ref3 doi: 10.1016/j.future.2017.11.022 – ident: ref48 doi: 10.1109/JIOT.2019.2892003 – year: 2015 ident: ref22 article-title: A theory for understanding and quantifying moving target defense (doctoral dissertation) contributor: fullname: zhuang – ident: ref66 doi: 10.1109/ICCAC.2017.18 – ident: ref13 doi: 10.1016/j.jss.2006.07.009 – ident: ref39 doi: 10.1109/ICSSA.2016.7 – ident: ref46 doi: 10.1016/j.future.2017.07.008 – start-page: 1 year: 2020 ident: ref70 article-title: IANVS: A moving target defense framework for a resilient Internet of Things publication-title: Proc IEEE Symp Comput Commun (ISCC) contributor: fullname: navas – ident: ref59 doi: 10.1109/JSYST.2019.2922589 – start-page: 1 year: 2019 ident: ref67 article-title: Per packet flow anonymization in 6LoWPAN IoT networks publication-title: Proc Int Conf Wireless Netw Mobile Commun (WINCOM) contributor: fullname: kouachi – year: 2018 ident: ref5 article-title: Survey of cyber moving targets second edition contributor: fullname: ward – ident: ref21 doi: 10.1145/2808475.2808478 – ident: ref10 doi: 10.1109/COMST.2020.2982955 – ident: ref54 doi: 10.1109/JIOT.2019.2961839 – ident: ref52 doi: 10.1145/2937755 – ident: ref16 doi: 10.1109/DISCEX.2001.932214 – year: 1903 ident: ref15 article-title: System of signaling contributor: fullname: tesla – ident: ref40 doi: 10.1145/2996890.3007877 – ident: ref58 doi: 10.1109/GIOTS.2019.8766426 – ident: ref36 doi: 10.1109/LWC.2018.2797916 – ident: ref34 doi: 10.1109/i-Society.2014.7009047 – ident: ref65 doi: 10.1109/ICDCS.2015.71 – ident: ref8 doi: 10.1155/2018/3759626 – start-page: 102 year: 2002 ident: ref62 article-title: Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal assumptions publication-title: Proc Int Conf Security Commun Netw contributor: fullname: itkis – ident: ref6 doi: 10.1109/MSP.2013.137 – ident: ref63 doi: 10.1109/CNS.2013.6682717 – ident: ref49 doi: 10.1109/JIOT.2019.2943151 – start-page: 31 year: 2019 ident: ref30 article-title: Challenges in designing exploit mitigations for deeply embedded systems publication-title: Proc IEEE Eur Symp Security Privacy (EuroS&P) contributor: fullname: abbasi – ident: ref28 doi: 10.1145/2602087.2602107 – ident: ref24 doi: 10.1016/j.cose.2018.08.003 – volume: 83 start-page: 12 year: 2017 ident: ref45 article-title: A framework for automating security analysis of the Internet of Things publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2017.01.033 contributor: fullname: ge – ident: ref56 doi: 10.1109/ISC2.2016.7580756 – ident: ref64 doi: 10.1109/CNS.2014.6997460 – ident: ref17 doi: 10.1145/2663474.2663479 – ident: ref43 doi: 10.1145/2593069.2593218 – ident: ref38 doi: 10.1016/B978-0-12-805395-9.00014-9 – ident: ref71 doi: 10.1016/S0304-3975(98)00075-9 – ident: ref29 doi: 10.1109/IRI.2013.6642449 – ident: ref41 doi: 10.3390/jsan7010012 – ident: ref44 doi: 10.1109/MILCOM.2017.8170748 – ident: ref42 doi: 10.1109/WF-IoT.2016.7845457 – ident: ref14 doi: 10.1201/b19467 – start-page: 41 year: 2014 ident: ref20 article-title: On the challenges of effective movement publication-title: Proc 1st ACM Workshop Moving Target Defense doi: 10.1145/2663474.2663480 contributor: fullname: hobson – ident: ref68 doi: 10.1007/978-3-319-40667-1_4 |
SSID | ssj0001105196 |
Score | 2.4167805 |
Snippet | Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems.... Context: Internet of Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems.... |
SourceID | hal proquest crossref ieee |
SourceType | Open Access Repository Aggregation Database Publisher |
StartPage | 7818 |
SubjectTerms | Bibliographies Computer Science Cryptography and Security Cyber security Cybersecurity Entropy Entropy (Information theory) Feasibility Foundations Internet of Things Internet of Things (IoT) Literature reviews Measurement metrics moving target defense (MTD) Moving targets Networking and Internet Architecture Proposals Security systematic literature review Systematics Taxonomy |
Title | MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT |
URI | https://ieeexplore.ieee.org/document/9270287 https://www.proquest.com/docview/2522907889 https://hal.science/hal-03088360 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDLXYTlwYMBCDgSLECa2sH8mantDENm2IwWFF4lalqStOK9oHvx-76wYSXLhVVSpVeUns59jPADeRTr2UqAbREm0cNgGORmucIDAmyFSgJHJx8ngWPr_pwZBlcjq7WhhELJPP8I4fy7v8rLBrDpV1Iy6e0mENamGkN7Va3_EUj52RXnVx6blR93HyEhMB9ImX0koNuKn7D9NTe-fEx7Kjyq9juLQto8b__uoQDiofUvQ3oB_BHs6PobHtzyCq7dqEeBoPOoKO2wXyYBG_F-t70ReznXqz2FwNiCIX0zK0IOIyM1wMMCd-iyLeSrwuBXm3YlLEJ_A6GsYPY6fqouDYIHRXTo7EOjiMb2TKCVtolLTkRlkd-tY1bp4pRVbMswY9JPaREXyWSKEve6wmKINTqM-LOZ6BIG88DWWuUUpfaitTl6Vy_NxVrocGVQtutxOcfGzEMpKSZLhRwmgkjEZSodGCa4JgN45lrsf9p4TfsYYOF5d8ei1o8oTvRlVz3YL2FrGk2nPLxFesXU-UPjr_-6sL2Pc5I4W1V1Ub6qvFGi-htszWV-Va-gI_DcP3 |
link.rule.ids | 230,315,782,786,798,887,27933,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8MwDLXYOMCFb8RgQIQ4IQr9SNb2hCYG2mCDA0HiFqWpK04rYozfj911Awku3Koqlaq8JPZz7GeA0zTJgoyoBtGSxHpsArwEnfWiyNooV5GSyMXJ_af44SXp3bBMzvmiFgYRq-QzvODH6i4_L92UQ2WXKRdPJXEDlpWMO_GsWus7ohKwO9Kpry4DP728GzxqooAhMVNaqxG3df9hfBqvnPpY9VT5dRBX1uV2_X__tQFrtRcpujPYN2EJx1uwPu_QIOoNuw16pHvngg7cd-TBQr-W0yvRFU8L_WYxuxwQZSFGVXBB6Co3XPSwIIaLQs9FXieC_FsxKPUOPN_e6Ou-V_dR8FwU-x9egcQ7OJBvZcYpW2iVdORIuSQOnW_9IleK7FjgLAZI_CMnAB3RwlB2WE9QRrvQHJdj3ANB_ngWyyJBKUOZOJn5LJYTFr7yA7SoWnA2n2DzNpPLMBXN8FPDaBhGw9RotOCEIFiMY6Hrfndo-B2r6HB5yWfQgm2e8MWoeq5b0J4jZupdNzGhYvV6IvXp_t9fHcNKX4-GZjh4uD-A1ZDzU1iJVbWh-fE-xUNoTPLpUbWuvgC888dI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=MTD%2C+Where+Art+Thou%3F+A+Systematic+Review+of+Moving+Target+Defense+Techniques+for+IoT&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Navas%2C+Renzo+E.&rft.au=Cuppens%2C+Frederic&rft.au=Boulahia+Cuppens%2C+Nora&rft.au=Toutain%2C+Laurent&rft.date=2021-05-15&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=8&rft.issue=10&rft.spage=7818&rft.epage=7832&rft_id=info:doi/10.1109%2FJIOT.2020.3040358&rft.externalDocID=9270287 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |