دانلود رایگان مقاله انگلیسی اینترنت اشیا: بررسی امنیت - تیلور و فرانسیس 2018

عنوان فارسی
اینترنت اشیا: بررسی امنیت
عنوان انگلیسی
Internet of things: Survey on security
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
22
سال انتشار
2018
نشریه
تیلور و فرانسیس
فرمت مقاله انگلیسی
PDF
کد محصول
E6490
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و فناوری اطلاعات
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده
مجله
مجله امنیت اطلاعات: چشم انداز جهانی - Information Security Journal: A Global Perspective
دانشگاه
Center for Education and Research in Information Security and Assurance - Purdue University - USA
کلمات کلیدی
دسترسی؛ محرمانه بودن؛ تمامیت؛ اینترنت اشیا؛ امنیت
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

ABSTRACT


The Internet of things (IoT) is intended for ubiquitous connectivity among different entities or “things”. While it provides effective and efficient solutions to many real world challenges, the security aspect of it has always been questioned. The situation is further exacerbated by the number of connected devices growing exponentially. As a result, security and privacy has emerged as a significant challenge for the IoT. In this paper, we aim to provide a thorough survey on IoT security and privacy challenges from the perspective of technologies and architecture used. This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability. The approach of this survey is to summarize and synthesize published work in IoT; relate it to the security conjuncture of the field; and project future research directions.

نتیجه گیری

Conclusion


The current state of IoT reveals that there is still a significant work to be done in order to secure embedded computer devices. Even though the number of IoT devices as well as new technologies and scientific publications has soared in the past few years, the security solutions and improvements have not kept the pace. Publicly known security breaches initiation vectors point to vulnerable and/ or neglected IoT devices and the number of records stolen continues to grow. The amount of data handled by IoT devices is soaring at exponential rates, which means higher exposure of sensitive data and brings up the need to foster discussions among security researchers. Recent efforts have not been able to cover the entire security spectrum, which reveals research opportunities in different areas including smart object hardening and detection capabilities. Current issues and challenges should be taken as improvement opportunities that need to be achieved under a rigorous process that incorporates security objectives at early design stages and efficient and effective application of security standardized solutions at production stages. End users, as well, need to understand the main objective of the device and how to fulfill their requirements under strict control and scrutiny to manage the always present risk for interconnectivity.


بدون دیدگاه