-
آرشیو :
نسخه بهار 1398
-
موضوع :
شبکه های کامپیوتری
-
نویسنده/گان :
توحید ساکت
-
کلید واژه :
اینترنت اشیاء، امنیت، مکانیزم امنیتی، امنیت اینترنت اشیاء.
-
Title :
Reviewing and comparing security, goals, security solutions and providing a security framework on the Internet of things
-
Abstract :
The Internet of Things has added an intelligence-based empowerment to the features of today's modern world, such as networks and organizations. It is not really a simple development of the Internet or a communication network, but has the characteristics of both. The Internet of Things uses activation sensors and data communication technology embedded in physical objects that allow objects to be tracked, coordinated, or controlled over a network or the Internet. In order for the IoT to become a global entity, its challenges must be met. Security, standardization and communication of objects are among the most important challenges of this promise in the world of information technology. This article discusses the concept of the Internet of Things, multi-layered architecture, challenges, threats, solutions to security attacks at the security vulnerability level, the limitations of this technology, and the provision of a security framework. Therefore, this article examines and evaluates IoT threats and vulnerabilities, layer security concerns, security techniques, security framework, and security mechanisms in terms of IoT security. The results in the proposed security framework refer to the development of a secure relationship in the security of architecture and object communication. However, the development of data privacy, confidentiality and integrity mechanisms can improve IoT security.
-
مراجع :
1. Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
2. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
3. Hussain, F. (2017). Internet of Things: Building Blocks and Business Models.
4. Van Tilborg, H. C., & Jajodia, S. (Eds.). (2014). Encyclopedia of cryptography and security. Springer Science & Business Media.
5. Ray, P. P. (2016). A survey on Internet of Things architectures. Journal of King Saud University-Computer and Information Sciences.
6. Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
7. Bucherer, E., & Uckelmann, D. (2011). Business models for the internet of things. In Architecting the internet of things (pp. 253-277). Springer Berlin Heidelberg.
8. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things Security: A Survey. Journal of Network and Computer Applications.
9. Borgia, E., Gomes, D. G., Lagesse, B., Lea, R. J., & Puccinelli, D. (2016). Special issue on “Internet of Things: Research challenges and Solutions”. Computer Communications, 89, 1-4.
10. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
11. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516.
12. Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks–a survey. Computer Communicatio-ns, 51, 1-20.
13. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
14. Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing. IEEE Transactions on industrial informatics, 10(2), 1537-1546.
15. Samaila, M. G., Neto, M., Fernandes, D. A., Freire, M. M., & Inácio, P. R. (2017). Security Challenges of the Internet of Things. In Beyond the Internet of Things (pp. 53-82). Springer International Publishing.
16. Ukil, A., Sen, J., & Koilakonda, S. (2011, March). Embedded security for Internet of Things. In Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on (pp. 1-6). IEEE.
17. Raza, S. (2013). Lightweight security solutions for the internet of things (Doctoral dissertation, Mälardalen University, Västerås, Sweden).
18. Gamundani, A. M. (2015, May). An impact review on internet of things attacks. In Emerging Trends in Networks and Computer Communications (ETNCC), 2015 International Conference on (pp. 114-118). IEEE.
19. Abomhara, M., & Køien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
20. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
21. Alqassem, I., & Svetinovic, D. (2014, December). A taxonomy of security and privacy requirements for the Internet of Things (IoT). In Industrial Engineering and Engineering Management (IEEM), 2014 IEEE International Conference on (pp. 1244-1248). IEEE.
22. Xu, T., Wendt, J. B., & Potkonjak, M. (2014, November). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (pp. 417-423). IEEE Press.
23. Tamboli, J., Kaneria, R., Patoliya, D., & Ramani, S. (2014). Security in the Internet of Things. Communication, Cloud and Big Data: Proceedings of CCB 2014.
24. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
25. Kanuparthi, A., Karri, R., & Addepalli, S. (2013, November). Hardware and embedded security in the context of internet of things. In Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (pp. 61-64). ACM.
26.Massis, B. (2016). The Internet of Things and its impact on the library. New Library World, 117(3/4), 289-292.
27. Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for IoT under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281-1293.
28. Ma, H. D. (2011). Internet of things: Objectives and scientific challenges. Journal of Computer science and Technology, 26(6), 919-924.
29. Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials, 16(1), 414-454.
30. Bi, Z., Wang, G., & Xu, L. D. (2016). A visualization platform for internet of things in manufacturing applications. Internet Research, 26(2), 377-401.
31. Barreto, L., Celesti, A., Villari, M., Fazio, M., & Puliafito, A. (2015, August). An authentication model for IoT clouds. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 (pp. 1032-1035). ACM.
32. Aman, W., & Snekkenes, E. (2015, December). Managing security trade-offs in the internet of things using adaptive security. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 362-368). IEEE.
33. Ndibanje, B., Lee, H. J., & Lee, S. G. (2014). Security analysis and improvements of authentication and access control in the internet of things. Sensors, 14(8), 14786-14805.
34. Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243-259.
35. Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, 3(3), 34-36.
36. Choi, J., Li, S., Wang, X., & Ha, J. (2012, June). A general distributed consensus algorithm for wireless sensor networks. In Wireless Advanced (WiAd), 2012 (pp. 16-21). IEEE.
37. Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46-53.
38. Covington, M. J., & Carskadden, R. (2013, June). Threat implications of the internet of things. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-12). IEEE.
39. Akhunzada, A., Gani, A., Anuar, N. B., Abdelaziz, A., Khan, M. K., Hayat, A., & Khan, S. U. (2016). Secure and dependable software defined networks. Journal of Network and Computer Applications, 61, 199-221.
40. Babar, S., Stango, A., Prasad, N., Sen, J., & Prasad, R. (2011, February). Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE.
41. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
42. Yao, X., Chen, Z., & Tian, Y. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, 104-112.
43. Jiang, H., Shen, F., Chen, S., Li, K. C., & Jeong, Y. S. (2015). A secure and scalable storage system for aggregate data in IoT. Future Generation Computer Systems, 49, 133-141.
44. Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., & Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452-459.
45. Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 32, 3-16.
46. Hashem, I. A. T., Chang, V., Anuar, N. B., Adewole, K., Yaqoob, I., Gani, A., ... & Chiroma, H. (2016). The role of big data in smart city. International Journal of Information Management, 36(5), 748-758.
47. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
48. Chakrabarty, S., Engels, D. W., & Thathapudi, S. (2015, October). Black SDN for the Internet of Things. In Mobile Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International Conference on (pp. 190-198). IEEE.
49. Bagci, I. E., Raza, S., Chung, T., Roedig, U., & Voigt, T. (2013, June). Combined secure storage and communication for the internet of things. In 2013 IEEE International Conference on Sensing, Communications and Networking (SECON) (pp. 523-531). IEEE.
50. Jucker, S. (2012). Securing the Constrained Application Protocol. no. October, 1-103.
51. Hartke, K., & Bergmann, O. (2012). Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-01 (work in progress).
52. Naccache, D., & Sauveron, D. (Eds.). (2014). Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014, Proceedings (Vol. 8501). Springer.
53. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
- صفحات : 62-70
-
دانلود فایل
( 470 KB )