مقاله انگلیسی رایگان در مورد اینترنت امنیت اشیا: یک نظرسنجی – الزویر 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 29 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع مقاله ISI
عنوان انگلیسی مقاله Internet of Things Security: a top-down survey
ترجمه عنوان مقاله اینترنت امنیت اشیا: یک نظرسنجی از بالا به پایین
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی فناوری اطلاعات و کامپیوتر
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده
مجله شبکه های کامپیوتری – Computer Networks
دانشگاه Université de Technologie de Compiègne CNRS – France
کلمات کلیدی اینترنت اشیا؛ امنیت؛ حریم خصوصی؛ رمزنگاری؛ بلاک چین؛ شبکه نرم‌افزار محور
کلمات کلیدی انگلیسی Internet of Things; Security; Privacy; Cryptography; Blockchain; Software Defined Networking
کد محصول E6859
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
1. Introduction

Nowadays, Internet of Things (IoT) is changing much about the world we live in, the way we drive, how we make decisions, and even how we get energy. Internet of things consists of sophisticated sensors, actuators and chips embedded in the physical things that around us by making them smarter than ever. These things are connected together and exchange huge data between them and with other digital components without any human intervention [3]. IoT contributes significantly to enhance our daily life throughout many applications come from different sectors such as smart cities, smart building, healthcare, smart grids, industrial manufacturing among others. Currently, one of the issues that potentially threats Internet of Things’ devices is the security and the privacy of exchanged/collected data that are often deeply linked to the life of users. Gartner 1 envisioned that, by 2017, more than 20% of organizations and businesses will deploy security solutions to protect their IoT devices. These considerations lead us to underline the importance of enforcing security mechanisms in IoT applications which play a pioneer role in mitigating IoT risks. Security problems in IoT are most challenging than the existing security problems in Internet of nowadays. Indeed, it is instructive to note that the things are highly resources-constrained in terms of computing capacity, memory and energy which make the existing security solutions absolutely not applicable. Moreover, the high number of connected objects, estimated by Cisco [46] to be about 50 billions of objects by 2020, arises scalability issues. These last years, a lot of researches are leading to address the various security challenges closely related to IoT such as key management issues [114], confidentiality, integrity, privacy, policy enforcements [110, 113] among many other challenges. The main works in the literature tried to adapt the security solutions proposed for wireless sensor networks (WSNs) and Internet in the context of IoT. However, we must point out that IoT’s challenges take a new dimension which is far from being easy to overcome with traditional solutions. In addition, we must emphasize that most security approaches rely to centralized architectures, making their applications in IoT much more complicated regarding the large number of objects. So, distributed approaches are required to deal with security issues in IoT. In this paper, we survey the different solutions according to two perspectives, namely the security approaches based on traditional cryptographic approaches and the other approaches based on new emerging technologies as SDN and Blockchain. In the literature, there are some published surveys that cover different aspects of security in IoT. In [14, 74, 127, 137, 108, 66], authors underlined the security challenges and issues in IoT without discussing the various solutions proposed for these challenges. Moreover, Roman et al. [104] discussed the main benefits and also the important issues to be addressed in terms of security and privacy in decentralized architectures.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا