دانلود رایگان مقاله انگلیسی بررسی سیستم تشخیص نفوذ نسبت به منبع اینترنت اشیا پایان به پایان - IEEE 2016

عنوان فارسی
بررسی سیستم های تشخیص نفوذ نسبت به یک منبع اینترنت اشیا پایان به پایان
عنوان انگلیسی
Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
7
سال انتشار
2016
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
کد محصول
E5908
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات، مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده، امنیت اطلاعات
مجله
چهارمین کنفرانس بین المللی آینده اینترنت اشیا و ابر - 4th International Conference on Future Internet of Things and Cloud
دانشگاه
College of Innovation and Technology - Florida Polytechnic University Lakeland - USA
کلمات کلیدی
اینترنت اشیا، IoT، ابر، شبکه های سنسور بی سیم، WSN، سیستم تشخیص نفوذ، IDS، شناسایی فرکانس رادیویی، RFID، تلفن همراه
چکیده

Abstract


The Internet of Things (IoT) is one of the largest technological evolutions of computing; by 2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The obscurity and low accessibility of many of these devices in this vast heterogeneous network will make it difficult to holistically monitor information flow. Nonetheless, to safeguard networks, unauthorized intruders must be detected within the constraints of each type of device or subnetwork before any system information can be disseminated. In this paper, a survey of the Intrusion Detection Systems (IDS) using the most recent ideas and methods proposed for the IoT is presented. To understand and illustrate IDS platform differences and the current research trend towards a universal, cross-platform distributed approach, the survey starts with an historical examination of intrusion detection systems. This examination of the foundations of IDS research based on the components that make up the IoT is followed by a look at the current holistic trend and an analysis of these schemes. Finally, guidelines to potential IDS in the IoT are proposed before identifying the open research problems.

نتیجه گیری

V.CONCLUSIONS AND FUTURE TRENDS


A. Conclusions


With affordable and easily constructed programmable embedded devices, DIYs and a spirit of young entrepreneurs paradigm is being promoted outside of the corporate and industrial realms. These distinctive changes are definitive of the IoT computing era. With a wide variety of architectures ranging from undocumented ad hoc embedded devices to very structured ones adhering to the standards, the IoT is burdened with additional security issues. For this reason, a ubiquitous IDS joined at time of network access, interacting with each service layer, will gain importance as an everincreasing number of less visible but Internet accessible applications are created.


B. Future Work


Within the last five years, the concept of a holistic architecture for IDS in the IoT has begun to be explored. Still in its infancy, this trend will grow and continued evaluation of IDS implementation at each service layer as well as benchmarks between systems will be important to the safety of the machines and their owners. Moreover, the prevention of unauthorized access to the IoT will depend on the intrusion detection capability of the most vulnerable components which are the embedded devices constrained by limited computational capacity and power – a long standing open problem for WSNs. Another issue is that the DIY user group is not trained in security. For example, the default userid and password of a Raspberry Pi microcontroller; Raspberry, Pi respectively is used. Also, rebooting microcontrollers for software updates is less frequent because it interrupts data collection of the monitored physical phenomena. For this reason, education and policy will also need to be established as part of the effort towards end to end IoT intrusion detection.


بدون دیدگاه