مشخصات مقاله | |
ترجمه عنوان مقاله | چالش های امنیت اینترنت اشیا: ابر و بلاک چین، رمزنگاری پساکوانتوم و فنون تکاملی |
عنوان انگلیسی مقاله | IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
انتشار | مقاله سال 2021 |
تعداد صفحات مقاله انگلیسی | 22 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه MDPI |
نوع نگارش مقاله | مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | JCR – Master Journal List – Scopus – DOAJ |
نوع مقاله |
ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
2.397 در سال 2020 |
شاخص H_index | 36 در سال 2020 |
شاخص SJR | 0.360 در سال 2020 |
شناسه ISSN | 2079-9292 |
شاخص Quartile (چارک) | Q2 در سال 2020 |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله / کنفرانس | الکترونیک – Electronics |
دانشگاه | Slovak University of Technology in Bratislava, Slovakia |
شناسه دیجیتال – doi | https://doi.org/10.3390/electronics10212647 |
کد محصول | E16051 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Introduction IoT Security Challenges Cloud and Blockchain in IoT Security Postquantum Cryptography Applications Evolutionary Techniques for Security Discussion Total efect of the environmental regulation Conclusions References |
بخشی از متن مقاله: |
Abstract Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future. Introduction The perceived reality of every person consists not only of physical dimensions but includes a significant virtual presence in cyberspace. The cyberspace dimension, however, is not separate: a huge array of connected sensors brings data from the physical world to cyberspace. These data influence the behavior of people connected to cyberspace, as well as feed back to processes in the physical world, especially in control systems. Similarly, data produced only in cyberspace can influence the physical world either by influencing human minds or control systems connected to cyberspace. The connected physical and cybernetic world faces many important questions, such as: What if the data are incorrect or even malicious? What if the processes are incorrectly programmed or are outright programmed to produce harmful results? Can people with wrong intentions influence our cybernetic systems and, through them, the physical world in unexpected or outright forbidden ways? We know that the answer is yes, and the potential of physical harm through the virtual world is real. Thus, it is critically important to focus on security aspects of cybernetic reality, especially in domains, where it has a strong interaction with the physical world. |