مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 16 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | REATO: REActing TO Denial of Service attacks in the Internet of Things |
ترجمه عنوان مقاله | REATO: واکنش به عدم پذیرش حملات سرویسی در اینترنت اشیا |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی فناوری اطلاعات و کامپیوتر |
گرایش های مرتبط | امنیت اطلاعات ، اینترنت و شبکه های گسترده |
مجله | شبکه های کامپیوتری – Computer Networks |
دانشگاه | Universita degli Studi dell’Insubria – Italy |
کلمات کلیدی | اینترنت اشیا، امنیت، عدم پذیرش سرویس، حملات، میان افزار، نمونه اولیه |
کلمات کلیدی انگلیسی | Internet of Things, Security, Denial of Service, Attacks, Middleware, Prototype |
کد محصول | E6862 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
I. INTRODUCTION
Many vulnerabilities affect applications based on the Internet of Things (IoT) paradigm. This is mainly due to the wireless nature of the communications taking place among the involved entities, which can be represented by heterogeneous devices, such as sensors, actuators, RFID, NFC, and so on. As a consequence, an IoT-based system can be object of various kinds of attacks to the network resources, to the integrity and confidentiality of the transmitted data, or to the privacy of the users or companies that exploit IoT services. Note that security is one of the main obstacles towards the wide adoption and diffusion of IoT applications [1]. Until now, little attention has been paid towards the identification and counteraction of specific kinds of attacks pursued in IoT contexts, but several solutions are available for wireless sensor networks (WSNs) [2] and mobile ad hoc networks (MANETs) [3], as presented in the state of the art section. However, such approaches should be revised with respect to the dynamicity and heterogeneity of the IoT environment. In order to guarantee proper levels of security, an IoT system should provide authentication systems for: (i) the entities that send data to the IoT platform; (ii) the entities that require information to the IoT platform in the form of services; then it should also provide encryption mechanisms for ciphering the transmitted data and, to do this, adopt an effective key management system. Finally, policies able to regulate the access to the available resources should be defined and enforced. However, besides such countermeasures would improve the resilience of the IoT system, particular attention must be directed against Denial of Service (DoS) attack, which is widely considered to be an important security issue [4]. There are various kinds of DoS attack, such as flooding the network with useless traffic, resource power exhaustion, and jamming the signal [5]. In fact, they aim at making devices or network resources unavailable by preventing the communications and/or compromising the traffic or wasting resources and, thus, blocking the access to the services provided by the IoT platform. Note that generally no variation is made on the transmitted data by such a kind of attack. DoS attacks can be initialized from a remote place by means of proper tools and commands. In the IoT, the situation worsens if not only data sources are attacked but if also the IoT platform itself is picked on. If the IoT platform, that acts as a distributed server, is saturated, for example, with external requests, then it cannot respond to legitimate ones in a reasonable time (i.e., because communications are slowed by the attack). On the other side, storage and computational resources of both devices and IoT platform will be consumed, thus generating further damages [6]. |