当前位置:   首页  -  学科服务  -  学科服务主页  -  学术前沿追踪  -  正文

最新英文期刊文献(物联网安全)推荐

 

Current research on Internet of Things (IoT) security: A survey

物联网安全研究现状综述

Computer Networks, Volume 148, 15 January 2019, Pages 283-294

Mardiana binti Mohamad Noor, Wan Haslina Hassan

摘要:The results of IoT failures can be severe, therefore, the study and research in security issues in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy, confidentiality, ensure the security of the users, infrastructures, data, and devices of the IoT, and guarantee the availability of the services offered by an IoT ecosystem. Thus, research in IoT security has recently been gaining much momentum with the help of the available simulation tools, modellers, and computational and analysis platforms. This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues. The main contribution of this paper is to provide an overview of the current state of IoT security research, the relevant tools,IoT modellers and simulators.

 

Securing the Internet of Things: Challenges, threats and solutions

物联网安全:挑战、威胁及其应对措施

Internet of Things, Volume 5, March 2019, Pages 41-70

Panagiotis I. Radoglou Grammatikis, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios

摘要:The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this context, this paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures. More detailed, after studying and determining the security requirements in the context of the IoT, we implement a qualitative and quantitative risk analysis, investigating the security threats per layer. Subsequently, based on this process we identify the suitable countermeasures and their limitations, paying special attention to the IoT protocols. Finally, we provide research directions for future work.

 

Communication technologies and security challenges for internet of things: A comprehensive review

物联网通信技术及其安全挑战综述

AEU - International Journal of Electronics and Communications, Volume 99, February 2019, Pages 81-99

Prachin Bhoyar, Parul Sahare, S. B. Dhok, R. B. Deshmukh

摘要:Internet of things’ (IoT) realize a network of millions of connected devices like sensors, actuators and transceivers. Being a composite system, IoT must deal with the associated problems while meeting throughput, latency, energy consumption, and security criteria. In this work, wireless technologies have been classified based on the mechanisms of physical layer, media access control layer, and network layer. The fundamentals of wireless communication and all the non-trivial interests associated with these three layers are summarized with respect to the criteria imposed by IoT. Various security threats at these layers and vulnerabilities of the standards against such attacks have also been listed out. To mitigate these problems, instead of relying on any one particular solution, more emphasis is given on the integrated approach where layer-wise solutions are provided. Thereafter, a brief analysis of the available wireless communication standards and their salient features are discussed. Research scope and challenges in IoT applications ranging from low power, low data rate, short range to extended coverage are identified, followed by possible directions to be taken. Additionally, the third generation partnership project for low-power wide area solutions to meet the IoT requirements are analyzed in detail.

 

Internet of Things: A survey on machine learning-based intrusion detection approaches

物联网:基于机器学习的入侵探测途径综述

Computer Networks, Volume 151, 14 March 2019, Pages 147-157

Kelton A. P. da Costa, João P. Papa, Celso O. Lisboa, Roberto Munoz, Victor Hugo C. de Albuquerque

摘要:In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to the proliferation of information technologies in everyday life. The increase in the number of Internet accesses and the emergence of new technologies, such as the Internet of Things (IoT paradigm, are accompanied by new and modern attempts to invade computer systems and networks. Companies are increasingly investing in studies to optimize the detection of these attacks. Institutions are selecting intelligent techniques to test and verify by comparing the best rates of accuracy. This research, therefore, focuses on rigorous state-of-the-art literature on Machine Learning Techniques applied in Internet-of-Things and Intrusion Detection for computer network security. The work aims, therefore, recent and in-depth research of relevant works that deal with several intelligent techniques and their applied intrusion detection architectures in computer networks with emphasis on the Internet of Things and machine learning. More than 95 works on the subject were surveyed, spanning across different themes related to security issues in IoT environments.

 

Cyber security framework for Internet of Things-based Energy Internet

基于物联网的能源互联网网络安全架构

Future Generation Computer Systems, Volume 93, April 2019, Pages 849-859

Abubakar Sadiq Sani, Dong Yuan, Jiong Jin, Longxiang Gao, Zhao Yang Dong

摘要:With the significant improvement in deployment of Internet of Things (IoT) into the smart grid infrastructure, the demand for cyber security is rapidly growing. The Energy Internet (EI) also known as the integrated internet-based smart grid and energy resources inherits all the security vulnerabilities of the existing smart grid. The security structure of the smart grid has become inadequate in meeting the security needs of energy domains in the 21st century. In this paper, we propose a cyber security framework capable of providing adequate security and privacy, and supporting efficient energy management in the EI. The proposed framework uses an identity-based security mechanism (I-ICAAAN), a secure communication protocol and an Intelligent Security System for Energy Management (ISSEM) to certify security and privacy in the EI. Nash Equilibrium solution of game theory is applied for the evaluation of our proposed ISSEM based on security events allocation. The formal verification and theoretical analysis show that our proposed framework provides security and privacy improvement for IoT-based EI.