مشخصات مقاله | |
ترجمه عنوان مقاله | کنترل دسترسی در اینترنت اشیا: چالش های بزرگ و فرصت های جدید |
عنوان انگلیسی مقاله | Access control in the Internet of Things: Big challenges and new opportunities |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 26 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journal List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
3.092 در سال 2017 |
شاخص H_index | 113 در سال 2019 |
شاخص SJR | 0.5 در سال 2017 |
شناسه ISSN | 1389-1286 |
شاخص Quartile (چارک) | Q2 در سال 2017 |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله | شبکه های کامپیوتری – Computer Networks |
دانشگاه | OSCARS Laboratory – Ensa of Marrakesh – Cadi Ayyad University – Morocco |
کلمات کلیدی | اینترنت اشیا، امنیت، حریم خصوصی، کنترل دسترسی |
کلمات کلیدی انگلیسی | Internet of Things، Security، Privacy، Access control |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.comnet.2016.11.007 |
کد محصول | E10661 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- A proposed (OM-AM) authorization reference model for IoT 3- Review of the literature within the OM-AM model 4- Analysis & evaluation 5- Discussion and open issues : authorization and access control challenges in IoT 6- Innovation trends and research future directions in IoT 7- Conclusion References |
بخشی از متن مقاله: |
Abstract In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An analysis of the security and privacy requirements for the most dominant IoT application domains, including Personal and home, Government and utilities, and Enterprise and industry, is conducted. The pros and cons of traditional, as well as recent access control models and protocols from an IoT perspective are highlighted. Furthermore, a qualitative and a quantitative evaluation of the most relevant IoT related-projects that represent the majority of research and commercial solutions proposed in the field of access control conducted over the recent years (2011- 2016) is achieved. Finally, potential challenges and future research directions are defined. Introduction Have you ever imagined your clothes, furniture, cars, household lights or even your coffee pots have their own Twitter accounts, interact with social networks and send data to the cloud, enabling aggregation of data from different devices and aspects of your lives? That is the era of The Internet of Things where the barriers between the real and cyber worlds are increasingly annihilated by turning out every day physical devices to smart objects. This is a huge and fundamental shift. When we start making things intelligent, it is going to be a great engine for creating new products and new services to improve peoples everyday lifestyle, spawn new businesses and make hospitals, factories, roads, airways, offices, retail stores and public buildings, smarter. So what will really happen when things that heretofore were blind and mute; talk, wash, hear and even think? These billions of devices are, actually, pervading our surrounding environment and even our bodies. For the sake of improving our lifestyle, they are tracking us and increasingly encroaching on our private and intimate spaces. Indeed, smart meters deduce when we shower, cars know when we do not go to work, wearable medical devices know our weight, and mobiles know how we feel [1]. As consequence, the success or fail-ure of this revolutionary evolution will be determined by two key challenges: security and privacy. Since lack of trust about privacy will result in decreased adoption among users. Actually, a study [2] about the future of digital trust released by orange has shown that 78% of consumers think that it is hard to trust companies when it comes to use their personal data. The EU Commissions public consultation on IoT governance and the FTCs latest debates have shown in a clear way that there is an urgent need for implementing security measures for minimizing the impact of a cyberattack and unlawful profiling and surveillance of individuals. |