امنیت اینترنت اشیا pdf

امنیت اینترنت اشیا pdf

نویسنده : مینا علی زاده | زمان انتشار : 05 تیر 1398 ساعت 12:46

با گسترش شبكه های بی سیم ، افزایش تعداد کاربران اینترنت و همچنین افزایش تولید محصولات هوشمند زمینه گسترش سریع اینترنت اشیاء در کشورهای مختلف فراهم گردیده است اما بزرگترین نگرانی پس از ورود اشیاء در خانه ها ، سازمانها و شرکت های خصوصی مبحث حریم خصوصی و امنیت اطلاعات می باشد و این موضوع با تشدید خبرهای سرقت اطلاعات از کاربران توسط هكرها گسترش و توسعه اینترنت اشیاء را به چالش کشیده است و نگرانی از عدم امنیت داده ها در کلیۀ سطوح مدل اینترنت اشیاء به عنوان داغ ترین مبحث تحقیقاتی مطرح می باشد،این تحقیق با استفاده از نتایج آخرین پژوهشها در این زمینه به دنبال بیان مشكلات ایمنی اینترنت اشیاء و ارائه راهكارهای مطمئن و پیشگیرانه در جهت افزایش امنیت در این مقوله می باشد تا کاربران با خیالی آسوده تر از امكانات این فن آوری جدید بهره برداری نمایند و پیشنهاد می گردد با توجه به افزایش کاربری اینترنت اشیاء در همه حوزه ها متناسب با هر یک در مورد مشكلات امنیتی بررسی جامع تری صورت پذیرد.

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand





 m032496f@student.staffs.ac.uk



    













         











                  



  











 



      

                 

3G,4G,5G













-Computer -Capacitor -Resistor -Semiconductor -Transistor -Optical fiber -wireless

-Internet of Things -Kevin Ashton

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand













 



































] [







[2]













-Security -Spy -sensor

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand





[2]









 [3]



[4]















[4]















[4]











[4]











-Architecture -Layer - Perception Layer -Wearabel devices -Network Layer

-Middleware Layer -cloud computing -Application Layer

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand



 



[4]



            

                

            







[5]



      

   



 



[3]







CIA 

[6]

















 Confidentiality -Integrity

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand





       

[6]















[3]





          







[3]

















[7] 





[7]





  



              

 

[4]

-Availability -Trojan -Non-network side-channel attacks -Denial of Service (DoS) attacks 

Camouflage -Sinkhole Attack

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand

  



       

[3]   



               

                 

 [7]

   



      



[7]  





[7]









[7]

   

  



   

[3]

  

                 

     

      [3] .

  



                    

     [4].

-Denial of Service (DoS) Attack -Man-in-the-Middle Attack -Malicious code injection -Sybil

Attack -Side-channel attacks -Denial of Service (DoS) Attack -Unauthorized Access -Malicious

Insider

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand

  

  

                  

                     

          [4]

   



                      

           [3].

 



                     

    [7].









 







 





[3]







         

[3]







[3]

-Malicious Code Injection -Sniffing Attack -Side-channel analysis -Policy-based mechanisms

and intrusion detection systems -Circuit modification

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand

(IDSs): 









[3]











[3]





     

          

[3]







[3]





                



[3]









  



[3]







-Securing firmware update -Reliable routing -Role-based authorization -Information flooding -

Cryptographic -Pre-testing -Outlier detection

3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand

[3]







.



     



    



       





     





















          







 





           





3rd.International Conference on Researches in Science & Engineering 31 Aug. 2017, Kasem Bundit University, Bangkok, Thailand





[2] Kellmereit D, Obodovski D. The Silent Intelligence: The Internet of Things, Published September 20th 2013

by Dnd Ventures LLC,2013.

[3] Mohsen Nia A, K. Jha N. A Comprehensive Study of Security of Internet-of-Things, IEEE Transactions on

Emerging Topics in Computing , Volume: PP, Issue: 99 ,2016.

[4] Leloglu E.A Review of Security Concerns inInternet of Things, Journal of Computer and Communication

5,121-136,2017.

[5] ACHBAROU O, Elbouanani S, El Kiram A. Introduction To The Internet Of Things Security:

Standardization and research challenges, Information Assurance and Security (IAS), 2015 11th International

Conference on,2015.

[6] Cristian Bude C , Kervefors Bergstrand A .Internet of Things Exploring and Securing a Future Concept ,

Bachelor’s Thesis, KTH Royal Institute of Technology School of Information and Communication

Technology (ICT) Department of Communication Systems,2015.

[7] Andrea I, Chrysostomou C, Hadjichristofi G. Internet of Things: Security vulnerabilities and challenges,

Computers and Communication (ISCC), 2015 IEEE Symposium on,2015.

This research hasn't been cited in any other publications.

  • Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing numerous services. Compact smart devices constitute an essential part of IoT. They range widely in use, size, energy capacity, and computation power. However, the integration of these smart things into the standard Internet introduces several security challenges because the majority of Internet technologies and communication protocols were not designed to support IoT. Moreover, commercialization of IoT has led to public security concerns, including personal privacy issues, threat of cyber attacks, and organized crime. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing. To achieve this goal, we first briefly describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new paradigm. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.

  • The transition from the current Internet to the Internet of things (IoT) is inevitable and is already necessary. The main aspect about the IoT paradigm is the integration of several technologies and standards. However, what places have the security and privacy in this paradigm? We present the necessary background by introducing the IoT paradigm. Then, we summarize the standards and enabling technologies that refer to security in the IoT. Furthermore, we point some major issues that should be faced by the research community related to the security in the IoT. Finally, based on our evaluation, we highlight some possible directions for future research. Our goal is not only to analyze, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards securing the IoT and to provide a solid base to start a scientific research around security and privacy on the IoT.

  • The Silent Intelligence: The Internet of Things

    Kellmereit D, Obodovski D. The Silent Intelligence: The Internet of Things, Published September 20th 2013 by Dnd Ventures LLC,2013.

  • A Review of Security Concerns inInternet of Things

    Leloglu E.A Review of Security Concerns inInternet of Things, Journal of Computer and Communication 5,121-136,2017.

  • Internet of Things Exploring and Securing a Future Concept , Bachelor's Thesis, KTH Royal Institute of Technology School of Information and Communication Technology (ICT) Department of Communication Systems

    • Cristian Bude
    • Kervefors Bergstrand

    Cristian Bude C, Kervefors Bergstrand A.Internet of Things Exploring and Securing a Future Concept, Bachelor's Thesis, KTH Royal Institute of Technology School of Information and Communication Technology (ICT) Department of Communication Systems,2015.

آیا این مطلب برای شما مفید بود؟




ارسال نظر

نام


ایمیل


نظر


  • آخرین مطالب
  • گوناگون