ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
The Internet of Things (IoT) is one of the largest technological evolutions of computing; by 2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The obscurity and low accessibility of many of these devices in this vast heterogeneous network will make it difficult to holistically monitor information flow. Nonetheless, to safeguard networks, unauthorized intruders must be detected within the constraints of each type of device or subnetwork before any system information can be disseminated. In this paper, a survey of the Intrusion Detection Systems (IDS) using the most recent ideas and methods proposed for the IoT is presented. To understand and illustrate IDS platform differences and the current research trend towards a universal, cross-platform distributed approach, the survey starts with an historical examination of intrusion detection systems. This examination of the foundations of IDS research based on the components that make up the IoT is followed by a look at the current holistic trend and an analysis of these schemes. Finally, guidelines to potential IDS in the IoT are proposed before identifying the open research problems.
V.CONCLUSIONS AND FUTURE TRENDS
A. Conclusions
With affordable and easily constructed programmable embedded devices, DIYs and a spirit of young entrepreneurs paradigm is being promoted outside of the corporate and industrial realms. These distinctive changes are definitive of the IoT computing era. With a wide variety of architectures ranging from undocumented ad hoc embedded devices to very structured ones adhering to the standards, the IoT is burdened with additional security issues. For this reason, a ubiquitous IDS joined at time of network access, interacting with each service layer, will gain importance as an everincreasing number of less visible but Internet accessible applications are created.
B. Future Work
Within the last five years, the concept of a holistic architecture for IDS in the IoT has begun to be explored. Still in its infancy, this trend will grow and continued evaluation of IDS implementation at each service layer as well as benchmarks between systems will be important to the safety of the machines and their owners. Moreover, the prevention of unauthorized access to the IoT will depend on the intrusion detection capability of the most vulnerable components which are the embedded devices constrained by limited computational capacity and power – a long standing open problem for WSNs. Another issue is that the DIY user group is not trained in security. For example, the default userid and password of a Raspberry Pi microcontroller; Raspberry, Pi respectively is used. Also, rebooting microcontrollers for software updates is less frequent because it interrupts data collection of the monitored physical phenomena. For this reason, education and policy will also need to be established as part of the effort towards end to end IoT intrusion detection.