مقاله انگلیسی رایگان در مورد REATO: واکنش به عدم پذیرش حملات سرویسی درIoT – الزویر 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 16 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع مقاله ISI
عنوان انگلیسی مقاله REATO: REActing TO Denial of Service attacks in the Internet of Things
ترجمه عنوان مقاله REATO: واکنش به عدم پذیرش حملات سرویسی در اینترنت اشیا
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی فناوری اطلاعات و کامپیوتر
گرایش های مرتبط امنیت اطلاعات ، اینترنت و شبکه های گسترده
مجله شبکه های کامپیوتری – Computer Networks
دانشگاه Universita degli Studi dell’Insubria – Italy
کلمات کلیدی اینترنت اشیا، امنیت، عدم پذیرش سرویس، حملات، میان افزار، نمونه اولیه
کلمات کلیدی انگلیسی Internet of Things, Security, Denial of Service, Attacks, Middleware, Prototype
کد محصول E6862
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
I. INTRODUCTION

Many vulnerabilities affect applications based on the Internet of Things (IoT) paradigm. This is mainly due to the wireless nature of the communications taking place among the involved entities, which can be represented by heterogeneous devices, such as sensors, actuators, RFID, NFC, and so on. As a consequence, an IoT-based system can be object of various kinds of attacks to the network resources, to the integrity and confidentiality of the transmitted data, or to the privacy of the users or companies that exploit IoT services. Note that security is one of the main obstacles towards the wide adoption and diffusion of IoT applications [1]. Until now, little attention has been paid towards the identification and counteraction of specific kinds of attacks pursued in IoT contexts, but several solutions are available for wireless sensor networks (WSNs) [2] and mobile ad hoc networks (MANETs) [3], as presented in the state of the art section. However, such approaches should be revised with respect to the dynamicity and heterogeneity of the IoT environment. In order to guarantee proper levels of security, an IoT system should provide authentication systems for: (i) the entities that send data to the IoT platform; (ii) the entities that require information to the IoT platform in the form of services; then it should also provide encryption mechanisms for ciphering the transmitted data and, to do this, adopt an effective key management system. Finally, policies able to regulate the access to the available resources should be defined and enforced. However, besides such countermeasures would improve the resilience of the IoT system, particular attention must be directed against Denial of Service (DoS) attack, which is widely considered to be an important security issue [4]. There are various kinds of DoS attack, such as flooding the network with useless traffic, resource power exhaustion, and jamming the signal [5]. In fact, they aim at making devices or network resources unavailable by preventing the communications and/or compromising the traffic or wasting resources and, thus, blocking the access to the services provided by the IoT platform. Note that generally no variation is made on the transmitted data by such a kind of attack. DoS attacks can be initialized from a remote place by means of proper tools and commands. In the IoT, the situation worsens if not only data sources are attacked but if also the IoT platform itself is picked on. If the IoT platform, that acts as a distributed server, is saturated, for example, with external requests, then it cannot respond to legitimate ones in a reasonable time (i.e., because communications are slowed by the attack). On the other side, storage and computational resources of both devices and IoT platform will be consumed, thus generating further damages [6].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا