امنیت اینترنت اشیا / Internet of Things Security

امنیت اینترنت اشیا Internet of Things Security

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : IEEE
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط امینت اطلاعات، رایانش امن، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
مجله کنفرانس بین المللی فن آوری های بی سیم، سیستم های جاسازی شده و هوشمند – International Conference on Wireless Technologies Embedded and Intelligent Systems
دانشگاه ACSA Laboratory – Mohammed First University – Morocco
شناسه دیجیتال – doi https://doi.org/10.1109/WITS.2017.7934655
منتشر شده در نشریه IEEE
کلمات کلیدی انگلیسی Security, Internet of Things, Layers, Protocols, Privacy, Network

Description

I. INTRODUCTION he beginning of the web is marked by the appearance of the web 0.1 still called traditional web which is primarily a static web, centered on the distribution of information. It is characterized by product-oriented sites, which require little intervention from users [1]. The appearance of social networks (Facebook, Twitter, LinkedIn …), blogs, and forums has revolutionized the web, it’s the web 0.2. Currently, they privilege the amount of sharing (texts, videos, images…) [1]. They sees the emergence of social networks, smartphones and blogs. This is where we want to go, even if the web 0.3 is not completely defined, it would be the semantic web, which aims to organize the mass of information available according to the context and the needs of each user, taking into consideration its location, preferences… [1], it is the internet of things (IoT). The Internet of Things represents a vision in which the Internet extends into the real world including everyday objects. Physical elements are no longer disconnected from the virtual world, but can be controlled remotely and serve as physical access points to Internet services. This paper is organized as follows: In section II, we first approach the black past of IoT, citing some outstanding examples in the world. Afterwards, we also dehull each IoT layer. Finally we explain the security of the IoT architecture (protocols, services, support technologies …) In Section III, we discuss the problems of each layer, analyzing their protocols, sensors and how used in attacks aimed at its weak points. In section IV, we describe attacks that affect the tags, reader and network protocol. We also provide possible ways to counter these attacks. In the last section, we cite some solutions proposed by the various companies and organizations in the field of IoT security. Finally, Section V concludes the paper which was just a reflection on this complicated subject, and gives possible future directions.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری