- مبلغ: ۸۶,۰۰۰ تومان
- مبلغ: ۹۱,۰۰۰ تومان
The Internet of things (IoT) is intended for ubiquitous connectivity among different entities or “things”. While it provides effective and efficient solutions to many real world challenges, the security aspect of it has always been questioned. The situation is further exacerbated by the number of connected devices growing exponentially. As a result, security and privacy has emerged as a significant challenge for the IoT. In this paper, we aim to provide a thorough survey on IoT security and privacy challenges from the perspective of technologies and architecture used. This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability. The approach of this survey is to summarize and synthesize published work in IoT; relate it to the security conjuncture of the field; and project future research directions.
The current state of IoT reveals that there is still a significant work to be done in order to secure embedded computer devices. Even though the number of IoT devices as well as new technologies and scientific publications has soared in the past few years, the security solutions and improvements have not kept the pace. Publicly known security breaches initiation vectors point to vulnerable and/ or neglected IoT devices and the number of records stolen continues to grow. The amount of data handled by IoT devices is soaring at exponential rates, which means higher exposure of sensitive data and brings up the need to foster discussions among security researchers. Recent efforts have not been able to cover the entire security spectrum, which reveals research opportunities in different areas including smart object hardening and detection capabilities. Current issues and challenges should be taken as improvement opportunities that need to be achieved under a rigorous process that incorporates security objectives at early design stages and efficient and effective application of security standardized solutions at production stages. End users, as well, need to understand the main objective of the device and how to fulfill their requirements under strict control and scrutiny to manage the always present risk for interconnectivity.