مشخصات مقاله | |
ترجمه عنوان مقاله | مدل های احراز هویت، کنترل دسترسی و مقیاس پذیری در امنیت اینترنت اشیا – یک بررسی |
عنوان انگلیسی مقاله | Authentication, access control and scalability models in Internet of Things Security–A review |
نشریه | الزویر |
انتشار | مقاله سال 2024 |
تعداد صفحات مقاله انگلیسی | 18 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
نوع نگارش مقاله |
مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | scopus |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
شناسه ISSN | 2772-9184 |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر – مهندسی فناوری اطلاعات |
گرایش های مرتبط | اینترنت و شبکه های گسترده – امنیت اطلاعات – رایانش ابری |
نوع ارائه مقاله |
ژورنال |
مجله | امنیت سایبری و کاربردهای آن – Cyber Security and Applications |
دانشگاه | School of Computer Science and Engineering, VIT-AP University, Amaravathi. Andhra Pradesh, India |
کلمات کلیدی | اینترنت اشیا – بلاک چین – مقیاس پذیری – امنیت داده ها – محاسبات لبه – طرح های احراز هویت |
کلمات کلیدی انگلیسی | Internet of Things – Blockchain – Scalability – Data Security – Edge computing – Authentication schemes |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.csa.2024.100057 |
لینک سایت مرجع | https://www.sciencedirect.com/science/article/pii/S2772918424000237 |
کد محصول | e17753 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract 1 Introduction 2 Technology behind IoT 3 Security in IoT 4 Authentication schemes 5 Access control and data privacy models 6 Scalability models 7 Conclusion and future directions Funding Availability of data and materials CRediT authorship contribution statement Declaration of competing interest Acknowledgment References |
بخشی از متن مقاله: |
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade data with one another. The IoT includes a wide variety of applications, each of which focuses on automating a specific task and works to give inanimate objects the ability to act independently of human intervention. The currently available and upcoming IoT applications hold a great deal of promise for enhancing the level of convenience, productivity, and automation enjoyed by users. High levels of security, privacy, authentication, and the ability to recover from attacks are required for the implementation of such a world in a manner that is constantly expanding. In this light, it is necessary to make the necessary adjustments to the architecture of IoT applications to accomplish end-to-end security in IoT environments. In this article, a comprehensive review of the security-related challenges and potential sources of danger posed by IoT applications is provided. Following a discussion of security concerns, a variety of new and established technologies that are focused on achieving a high degree of trust in the applications of the IoT are covered. Machine learning, fog computing, edge computing, and blockchain are just a few of the technologies that help the IoT provide greater security. Introduction The Internet of Things (IoT) is one of the disruptive technologies of the 21st century that has revolutionized every business dimension across the globe. The Internet has become an essential component in daily activities such as e-commerce, e-learning, e-conferences, etc. According to [1], the number of IoT devices deployed may exceed 21.3 billion by 2022. Intelligent interfaces connect IoT devices in order to collaborate, gather, communicate, and store data. Deploying IoT devices enhances business productivity by optimizing operational procedures and maximizing the utilization of available resources. IoT brings innovation in the way things are monitored and managed remotely with the help of real-time data acquired from the sensors. With the unrestrained volumes of data generated by billions of connected devices, storage, management, and security are arduous. Security aspects such as authentication, authorization, privacy, confidentiality, availability, and integrity form the basis for information exchange in a trusted environment. Authentication is the process of identifying the genuineness of an entity. The authorization process allows only authenticated users to access the resources. The protection of privacy prevents hackers from accessing the user’s private information. Data confidentiality is an outcome of authentication and authorization. It prevents sensitive data from being reclaimed and exploited. A device’s availability confirms that IoT devices and services are resilient to attacks and are accessible all the time. Data integrity is the process of providing a tamper-proof platform for information communication, exchange, and storage. Conclusion and future directions In this paper, the methods that are currently available in the literature are discussed, and this paper also presents the methods that are currently available. The subsequent step is an in-depth discussion of the numerous security risks and the importance of threat modeling. The subsequent topic is a discussion of the various IoT applications’ necessary security precautions. It reviews the prior research on the numerous security issues and the solutions put forth by various researchers. The holes that were found while conducting this literature review served as inspiration for the current research work. 7.1. Research challenges |