مقاله انگلیسی رایگان در مورد امنیت ارتباط در شبکه های IoT – الزویر 2020

 

مشخصات مقاله
ترجمه عنوان مقاله یک بررسی جامع از جنبه های رمزنگاری برجسته برای امنیت ارتباط در شبکه های IoT پس از کوانتومی
عنوان انگلیسی مقاله A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks
انتشار مقاله سال 2020
تعداد صفحات مقاله انگلیسی 23 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله مروری (Review Article)
مقاله بیس این مقاله بیس نمیباشد
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
شناسه ISSN 2542-6605
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مهنذسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده
نوع ارائه مقاله
ژورنال
مجله  اینترنت اشیا – Internet of Things
دانشگاه  University Institute of Engineering and Technology, Kurukshetra University, India
کلمات کلیدی اینترنت اشیا، امنیت، رمزنگاری، توزیع کلید کوانتومی، رمزنگاری پس از کوانتومی
کلمات کلیدی انگلیسی Internet of things، Security، Cryptography، Quantum key distribution، Post-quantum cryptography
شناسه دیجیتال – doi
https://doi.org/10.1016/j.iot.2020.100174
کد محصول E14641
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
1. Introduction
2. Background, statistics, and motivation
3. IOT architectural challenges, security attacks, and countermeasures
4. Conventional cryptograhphic mechanisms for IOT security
5. Quantum cryptography
6. Open challenges and future research directions
7. Conclusion
Declaration of Competing Interest
References

بخشی از متن مقاله:
Abstract

Internet of Things (IoT) ideates smart and inter-connected things capable of sharing their perceptions through the Internet. These devices are different from conventional Internetconnected devices in the sense that these are able to perform skill-full things on their own with minimal or no human interaction. Unfortunately, with the advent of amalgamate technologies, security has become a major concern for IoT networks. Recent efforts include re-inventing cryptographic solutions through the use of light-weight operations. However, after witnessing the growth of quantum computers, it can be inferred that the cryptographic techniques based on mathematical problems are not reliable enough. Therefore, there is need to develop solutions that can easily resist the adversarial effects and are suitable for the post-quantum world. In this paper, we perform in-depth analysis over the role of post-quantum cryptographic techniques for securing IoT networks and also explore ongoing research efforts in the field. In addition, we discuss the open research challenges and future research directions in the field.

Introduction

Internet of Things (IoT) is a cluster of technologies that requires different set of protocols, infrastructures, data storage mechanisms, and ways of communication associated with Information Technology (IT). Resource allocation in a smart manner is one of the key requirements while dealing with IoT devices as they are constrained in terms of energy, storage and computational resources. Communication technology for actuating and managing the data is also of great concern [1–3]. As a matter of fact, IoT ecosystem faces a lot of challenges associated with a number of aspects as shown in Fig. 1. This new paradigm of connected objects needs an assimilation of next generation technologies. In order to simultaneously provide ultra-reliability of communication, following technologies can be integrated – • Software Defined Networks (SDN) for managing haptic communications, • 5G technology for providing tactile Internet, and • The new era of distributed Cloud computing, i.e., edge computing for managing the resources. Significant increase in the use of IoT devices is bringing numerous business opportunities. However, manufacturers are still unable to ensure their customers that these devices are secure. Hence, despite all of the advantages, the security issues of these devices are acting as a huge rock in the way of letting this paradigm making a colossal impact on our lives.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا