当前位置: X-MOL 学术J. Netw. Comput. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics
Journal of Network and Computer Applications ( IF 8.7 ) Pub Date : 2020-07-17 , DOI: 10.1016/j.jnca.2020.102761
Mobasshir Mahbub

The IoT is the upcoming one of the major networking technologies. Using the IoT, different items or devices can be allowed to continuously generate, obtain, and exchange information. Different IoT applications nowadays are centered on computerizing various errands and are attempting to engage the inanimate physical items to act without direct supervision of a human. The current and forthcoming IoT services are exceptionally encouraging to build the degree of solace, proficiency, and automation for the clients. To obtain the option to actualize such a world in a continuously developing manner requires high security, protection, verification, and recuperation from assaults. Right now, incorporating the requisite changes in IoT systems engineering to achieve end-to-end, stable IoT infrastructure is paramount. In this research, a comprehensive analysis is incorporated into the security-relevant problems and threat wellsprings in IoT resources or applications. Specific that and current advancements based on maintaining a high degree of confidence in IoT apps are addressed while looking at the security issues. Four distinct developments are investigated, including cryptography, fog computing, edge computing, and ML (Machine Learning), to extend the degree of IoT security.



中文翻译:

物联网安全性的渐进研究:从协议,漏洞和抢先架构的角度进行详尽的分析

物联网是即将到来的主要网络技术之一。使用物联网,可以允许不同的物品或设备连续生成,获取和交换信息。如今,各种物联网应用程序都以对各种差事进行计算机化为中心,并试图在没有人类直接监督的情况下,使无生命的物理物品起作用。当前和即将推出的物联网服务极大地鼓舞了客户,使他们获得了安慰,熟练和自动化的程度。为了获得以不断发展的方式实现这样一个世界的选择,需要高度的安全性,保护,核实和免受伤害。目前,将物联网系统工程中的必要更改纳入以实现端到端的稳定物联网基础设施至关重要。在这项研究中 物联网资源或应用程序中与安全相关的问题和威胁源泉已进行了全面的分析。着眼于安全性问题的同时,还针对基于物联网应用程序保持高度信任的特定和当前进展。研究了四个不同的发展,包括密码学,雾计算,边缘计算和ML(机器学习),以扩展IoT安全的程度。

更新日期:2020-07-17
down
wechat
bug