مقاله انگلیسی رایگان در مورد معماری تشخیص نفوذ ترکیبی برای اینترنت اشیا – IEEE 2016

مقاله انگلیسی رایگان در مورد معماری تشخیص نفوذ ترکیبی برای اینترنت اشیا – IEEE 2016

 

مشخصات مقاله
انتشار مقاله سال ۲۰۱۶
تعداد صفحات مقاله انگلیسی ۶ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه IEEE
نوع مقاله ISI
عنوان انگلیسی مقاله A Hybrid Intrusion Detection Architecture for Internet of Things
ترجمه عنوان مقاله معماری تشخیص نفوذ ترکیبی برای اینترنت اشیا
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده
مجله هشتمین همایش بین المللی مخابرات – ۸th International Symposium on Telecommunications
دانشگاه Department of Communication Engineering Islamic Azad University – South Tehran Branch Tehran – Iran
کلمات کلیدی  اینترنت اشیا، تشخیص نفوذ، مسیر مطلوب جنگل، تشخیص آنومالی
کلمات کلیدی انگلیسی Internet of things, intrusion detection, optimum path forest, anomaly detection
کد محصول E6159
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
I. INTRODUCTION

The Internet of things (IoT) is a worldwide network in which all heterogeneous objects around us (such as smart phones, laptops or smart sensors) can connect to the Internet by using a wide range of technologies. In other words, large number of smart interconnected devices in IoT results in valuable services to the society and individual citizens [1]. Moreover, IoT can be supported by satellite communication systems for the case of Internet of remote things (IoRT) in which Internet protocol version 6 (IPv6) should be supported over satellite [2]. The general architecture of IoT is shown in Fig. 1. As seen in Fig. 1, the IPv6 over low-power wireless personal area networks (6LoWPANs) [3] is a wireless sensor network (WSN) which allows the connection of resource-constrained devices, such as sensor nodes, to the Internet through the 6LoWPAN border router (6BR) [4, 5]. It is noted that the routing protocol for low power and lossy networks (RPL) [5] is a certain routing protocol for 6LoWPAN. The RPL, which is based on the construction of a destination-oriented directed acyclic graph (DODAG), is an IP-based distance vector and hop-by-hop routing protocol. RPL enables different operations such as the unidirectional traffic towards a DODAG root, bidirectional traffic between resource-constrained devices (i.e., 6LoWPAN nodes), and bidirectional traffic between resource-constrained devices and the DODAG root [5]. Along with the rapid growth of technology in computer networks such as IoT, security has become a critical challenge. The main security requirements for the IoT are as follows [6]: a) data confidentiality and authentication and b) privacy and trust among users and things. The communication in the IoT can be secured by using standard mechanisms such as cryptography and authentication techniques; however, these preventive mechanisms cannot detect all possible attacks, because of the nature of wireless communication. On the other hand, the resource-constrained devices are directly connected to unreliable Internet via IPv6 and 6LoWPAN networks in the IoT; so, they are vulnerable to intrusions (both from the Internet and WSNs) [4]. Therefore, an intrusion detection system (IDS) is required for detecting malicious activities in the IoT besides the standard security mechanisms. IDS is an effective mechanism which gathers system activities or network traffic as input data with the aim of analyzing them for identifying malicious behaviors. IDSs are classified into the following categories: a) misuse-based (as the best method for detecting known attacks); b) anomalybased (as the best method for detecting unknown attacks); and c) specification-based detection systems.

ثبت دیدگاه