مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 3 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Internet of Things security and forensics: Challenges and opportunities |
ترجمه عنوان مقاله | امنیت و قوانین اینترنت اشیا: چالش ها و فرصت ها |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی فناوری اطلاعات |
گرایش های مرتبط | اینترنت و شبکه های گسترده |
مجله | نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems |
دانشگاه | Department of Mathematics – University of Padua – Italy |
کلمات کلیدی | اینترنت اشیا، امنیت سایبری، دیجیتال فورنسیک |
کد محصول | E5780 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
The Internet of Things (IoT) integrates various sensors, objects and smart nodes that are capable of communicating with each other without human intervention [1] . The objects/things function autonomously in connection with other objects. IoT nodes are capable of delivering lightweight data, accessing and authorising cloud-based resources for collecting and extracting data and making decisions by analysing collected data. The emergence of IoT has led to pervasive connection of people, services, sensors and objects. IoT devices are now deployed in a wide range of applications from smart grids to healthcare and intelligence transport systems [2]. Huge business opportunities that exist within IoT domain significantly increased number of smart devices and intelligent, autonomous services offered in IoT networks. Moreover, reliance of IoT devices on cloud infrastructure for data transfer, storage and analysis led to development of cloud-enabled IoT networks [3]. Security issues such as privacy, access control, secure communication and secure storage of data are becoming significant challenges in IoT environment [4]. Moreover, every single device that we create, every new sensor that we deploy, and every single byte that is synchronised within an IoT environment may at some point come under scrutiny in the course of an investigation. The fast growth of IoT devices and services led to deployment of many vulnerable and insecure nodes [5]. Moreover, conventional user-driven security architectures are of little use in object-driven IoT networks [6]. Therefore, we require specialised tools, techniques and procedures for securing IoT networks and collecting, preserving and analysing residual evidences of IoT environments. In this special issue we sought new and unpublished works in the domain of IoT security and forensics. The remainder of this paper is organised as follows. In the next section, we briefly discuss about security challenges in IoT environment. In Section 3, we provide a brief discussion of forensics challenges within IoT networks. We offer a brief review of accepted articles in this special issue in Section 4, and finally conclude the paper. |