منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله انگلیسی کنترل دسترسی در اینترنت اشیا: چالش های بزرگ و فرصت های جدید - الزویر 2017

عنوان فارسی
کنترل دسترسی در اینترنت اشیا: چالش های بزرگ و فرصت های جدید
عنوان انگلیسی
Access control in the Internet of Things: Big challenges and new opportunities
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
26
سال انتشار
2017
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
نوع مقاله
ISI
نوع نگارش
مقالات مروری
رفرنس
دارد
پایگاه
اسکوپوس
کد محصول
E10661
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، اینترنت وشبکه های گسترده
مجله
شبکه های کامپیوتری - Computer Networks
دانشگاه
OSCARS Laboratory - Ensa of Marrakesh - Cadi Ayyad University - Morocco
کلمات کلیدی
اینترنت اشیا، امنیت، حریم خصوصی، کنترل دسترسی
doi یا شناسه دیجیتال
https://doi.org/10.1016/j.comnet.2016.11.007
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

abstract


In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An analysis of the security and privacy requirements for the most dominant IoT application domains, including Personal and home, Government and utilities, and Enterprise and industry, is conducted. The pros and cons of traditional, as well as recent access control models and protocols from an IoT perspective are highlighted. Furthermore, a qualitative and a quantitative evaluation of the most relevant IoT related-projects that represent the majority of research and commercial solutions proposed in the field of access control conducted over the recent years (2011- 2016) is achieved. Finally, potential challenges and future research directions are defined.

نتیجه گیری

Conclusion


Recently, many efforts have overcome many of the technological requirements for the integration of smart objects into the current Internet. However, IoT paradigm has still to face hard challenges related to the application of security and access control mechanisms over constrained environments. In this survey, we have established a taxonomy of IoT domain applications, ranging from big industries such as smart grid, to personal and everyday appliance such as smart homes. Furthermore, an OM-AM analysis of authorization process in IoT was provided. We have also extracted the pros and cons of existing access control solutions from an IoT perspective and their usability in the IoT domain applications already defined. We evaluated related literature in both quantitative and qualitative ways based on main IoT security requirements. This evaluation is highlighted with graph that shows in a very representative way how each model meets each requirement. On the light of our evaluation, we identified the main challenges of applying access control mechanisms to IoT and argued that commonly used Internet protocols cannot in every case be applied to constrained environments. We also discussed the main advantages and drawbacks of adopting a distributed or centralized access control management in IoT. Finally, based on latest innovations in IoT field, we have dressed the main future directions of security and particularly those of access control in IoT. Future work consists in implementing a privacy-preserving access control framework based on the presented OM-AM reference model in order to conceive an adequate access control framework for IoT.


بدون دیدگاه