مشخصات مقاله | |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه IEEE |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Internet of Things Security |
ترجمه عنوان مقاله | امنیت اینترنت اشیا |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | امینت اطلاعات، رایانش امن، اینترنت و شبکه های گسترده، شبکه های کامپیوتری |
مجله | کنفرانس بین المللی فن آوری های بی سیم، سیستم های جاسازی شده و هوشمند – International Conference on Wireless Technologies Embedded and Intelligent Systems |
دانشگاه | ACSA Laboratory – Mohammed First University – Morocco |
کلمات کلیدی | امنیت، اینترنت اشیا، لایه ها، پروتکل ها، حریم خصوصی، شبکه |
کلمات کلیدی انگلیسی | Security, Internet of Things, Layers, Protocols, Privacy, Network |
شناسه دیجیتال – doi | https://doi.org/10.1109/WITS.2017.7934655 |
کد محصول | E8206 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
I. INTRODUCTION
he beginning of the web is marked by the appearance of the web 0.1 still called traditional web which is primarily a static web, centered on the distribution of information. It is characterized by product-oriented sites, which require little intervention from users [1]. The appearance of social networks (Facebook, Twitter, LinkedIn …), blogs, and forums has revolutionized the web, it’s the web 0.2. Currently, they privilege the amount of sharing (texts, videos, images…) [1]. They sees the emergence of social networks, smartphones and blogs. This is where we want to go, even if the web 0.3 is not completely defined, it would be the semantic web, which aims to organize the mass of information available according to the context and the needs of each user, taking into consideration its location, preferences… [1], it is the internet of things (IoT). The Internet of Things represents a vision in which the Internet extends into the real world including everyday objects. Physical elements are no longer disconnected from the virtual world, but can be controlled remotely and serve as physical access points to Internet services. This paper is organized as follows: In section II, we first approach the black past of IoT, citing some outstanding examples in the world. Afterwards, we also dehull each IoT layer. Finally we explain the security of the IoT architecture (protocols, services, support technologies …) In Section III, we discuss the problems of each layer, analyzing their protocols, sensors and how used in attacks aimed at its weak points. In section IV, we describe attacks that affect the tags, reader and network protocol. We also provide possible ways to counter these attacks. In the last section, we cite some solutions proposed by the various companies and organizations in the field of IoT security. Finally, Section V concludes the paper which was just a reflection on this complicated subject, and gives possible future directions. |