مقاله انگلیسی رایگان در مورد کنترل دسترسی در اینترنت اشیا – الزویر 2017

 

مشخصات مقاله
ترجمه عنوان مقاله کنترل دسترسی در اینترنت اشیا: چالش های بزرگ و فرصت های جدید
عنوان انگلیسی مقاله Access control in the Internet of Things: Big challenges and new opportunities
انتشار مقاله سال 2017
تعداد صفحات مقاله انگلیسی 26 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله مروری (Review Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journal List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
3.092 در سال 2017
شاخص H_index 113 در سال 2019
شاخص SJR 0.5 در سال 2017
شناسه ISSN 1389-1286
شاخص Quartile (چارک) Q2 در سال 2017
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده
نوع ارائه مقاله
ژورنال
مجله  شبکه های کامپیوتری – Computer Networks
دانشگاه  OSCARS Laboratory – Ensa of Marrakesh – Cadi Ayyad University – Morocco
کلمات کلیدی اینترنت اشیا، امنیت، حریم خصوصی، کنترل دسترسی
کلمات کلیدی انگلیسی Internet of Things، Security، Privacy، Access control
شناسه دیجیتال – doi
https://doi.org/10.1016/j.comnet.2016.11.007
کد محصول  E10661
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

1- Introduction

2- A proposed (OM-AM) authorization reference model for IoT

3- Review of the literature within the OM-AM model

4- Analysis & evaluation

5- Discussion and open issues : authorization and access control challenges in IoT

6- Innovation trends and research future directions in IoT

7- Conclusion

References

بخشی از متن مقاله:

Abstract

In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An analysis of the security and privacy requirements for the most dominant IoT application domains, including Personal and home, Government and utilities, and Enterprise and industry, is conducted. The pros and cons of traditional, as well as recent access control models and protocols from an IoT perspective are highlighted. Furthermore, a qualitative and a quantitative evaluation of the most relevant IoT related-projects that represent the majority of research and commercial solutions proposed in the field of access control conducted over the recent years (2011- 2016) is achieved. Finally, potential challenges and future research directions are defined.

Introduction

Have you ever imagined your clothes, furniture, cars, household lights or even your coffee pots have their own Twitter accounts, interact with social networks and send data to the cloud, enabling aggregation of data from different devices and aspects of your lives? That is the era of The Internet of Things where the barriers between the real and cyber worlds are increasingly annihilated by turning out every day physical devices to smart objects. This is a huge and fundamental shift. When we start making things intelligent, it is going to be a great engine for creating new products and new services to improve peoples everyday lifestyle, spawn new businesses and make hospitals, factories, roads, airways, offices, retail stores and public buildings, smarter. So what will really happen when things that heretofore were blind and mute; talk, wash, hear and even think? These billions of devices are, actually, pervading our surrounding environment and even our bodies. For the sake of improving our lifestyle, they are tracking us and increasingly encroaching on our private and intimate spaces. Indeed, smart meters deduce when we shower, cars know when we do not go to work, wearable medical devices know our weight, and mobiles know how we feel [1]. As consequence, the success or fail-ure of this revolutionary evolution will be determined by two key challenges: security and privacy. Since lack of trust about privacy will result in decreased adoption among users. Actually, a study [2] about the future of digital trust released by orange has shown that 78% of consumers think that it is hard to trust companies when it comes to use their personal data. The EU Commissions public consultation on IoT governance and the FTCs latest debates have shown in a clear way that there is an urgent need for implementing security measures for minimizing the impact of a cyberattack and unlawful profiling and surveillance of individuals.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا