دانلود رایگان مقاله انگلیسی در مورد چالش های امنیتی و مسائل باز در اینترنت اشیا - الزویر 2018

عنوان فارسی
در مورد چالش های امنیتی و مسائل باز در اینترنت اشیا
عنوان انگلیسی
On security challenges and open issues in Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
38
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6066
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و فناوری اطلاعات
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده، رایانش امن و امنیت اطلاعات
مجله
نسل آینده سیستم های کامپیوتری - Future Generation Computer Systems
دانشگاه
Nanjing University of Posts and Communications - Nanjing - China
کلمات کلیدی
اینترنت اشیا، امنیت؛ معماری، چالش ها، IoT، مسائل باز
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught significant attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and meanwhile, could have higher security requirements. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. This paper aims to analyze security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. In addition, three architectural security designs are proposed and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.

نتیجه گیری

8. Conclusion


With increasing deployments of IoT systems, security becomes a key component to protect both the cyber and the physical world. This paper first analyzes the new security challenges presented by the features of IoT systems, especially by resource-constrained IoT end devices and the tight coupling of the cyber and physical world. Then three architectural security designs are summarized to guide future security protocol and algorithm design. Advantages and limitations of each design are analyzed in detail. Examples of how to implement each design are presented. Based on our analysis, low capable end devices need help from the levels above in order to achieve a good level of security of the whole IoT system.


بدون دیدگاه