مقاله انگلیسی رایگان در مورد امنیت اینترنت اشیا: راه حل های بلاک چین – الزویر ۲۰۱۸

مقاله انگلیسی رایگان در مورد امنیت اینترنت اشیا: راه حل های بلاک چین – الزویر ۲۰۱۸

 

مشخصات مقاله
انتشار مقاله سال ۲۰۱۸
تعداد صفحات مقاله انگلیسی ۱۷ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع نگارش مقاله مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index)
Scopus – Master journals – JCR
نوع مقاله ISI
شاخص Quartile (چارک): Q1 در سال ۲۰۱۹
شناسه ISSN ۰۱۶۷-۷۳۹X
ایمپکت فاکتور(IF) ۴٫۶۳۹ در سال ۲۰۱۷
شاخص H_index ۸۵ در سال ۲۰۱۹
شاخص SJR ۰٫۸۴۴ در سال ۲۰۱۹
عنوان انگلیسی مقاله IoT security: Review, blockchain solutions, and open challenges
ترجمه عنوان مقاله امنیت اینترنت اشیا: مرور، راه حل های بلاک چین و باز کردن چالش ها
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
مجله نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems
دانشگاه Bahauddin Zakariya University Multan – Pakistan
کلمات کلیدی امنیت IoT، بلاک چین، پروتکل های IoT، امنیت شبکه، امنیت داده ها
کلمات کلیدی انگلیسی IoT security, Blockchain, IoT protocols, Network security, Data security
کد محصول E6519
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
۱٫ Introduction

With the rapid growth of smart devices and high speed networks, the Internet of Things (IoT) has gained wide acceptance and popularity as the main standard for low-power lossy networks (LLNs) having constrained resources. It represents a network where ‘‘things’’ or embedded devices having sensors are interconnected through a private or a public network [1,2]. The devices in IoT can be controlled remotely to perform the desired functionality. The information sharing among the devices then takes place through the network which employs the standard protocols of communication. The smart connected devices or ‘‘things’’ range from simple wearable accessories to large machines, each containing sensor chips. For instance, the Lenovo smart shoes contain chips which provide support of tracking and analyzing fitness data [3]. Similarly, the electrical appliances including washing machines, and refrigerators can be controlled remotely through IoT. The security cameras installed for surveillance of a location can be monitored remotely anywhere in the world. Apart from the personal use, IoT serves the community needs as well. Various smart devices which perform diverse functionalities such as monitoring surgery in hospitals, detecting weather conditions, providing tracking and connectivity in automobiles, and identification of animals using biochips are already serving the community specific needs [4]. The data collected through these devices may be processed in real-time to improve efficiency of the entire system. The future significance of IoT is evident due to its application in everyday life. It continues to grow rapidly due to evolution of hardware techniques such as improving bandwidth by incorporating cognitive radio based networks to address underutilization of frequency spectrum [5,6]. In the literature, the Wireless Sensor Networks (WSNs) and Machine-to-Machine (M2M) or CyberPhysical Systems (CPS) have now evolved as integral components for the broader term IoT. Consequently, the security problems related to WSN, M2M, or CPS continue to arise in the context of IoT with the IP protocol being the main standard for connectivity. The entire deployment architecture therefore needs to be secured from attacks which may hinder the services provided by IoT as well as may pose threat to privacy, integrity or confidentiality of data. Since the IoT paradigm represents a collection of interconnected networks, and heterogeneous devices, it inherits the conventional security issues related to the computer networks. The constrained resources pose further challenges to IoT security since the small devices or things containing sensors have limited power and memory. Consequently, the security solutions need to be adapted to the constrained architectures.

ثبت دیدگاه