当前位置: X-MOL 学术IEEE Access › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Web of Things: Security Challenges and Mechanisms
IEEE Access ( IF 3.9 ) Pub Date : 2021-02-08 , DOI: 10.1109/access.2021.3057655
Ruhma Sardar , Tayyaba Anees

Web of things (WoT) is an improved and most promising infrastructure of the internet of things (IoT) which permits the smart things to not only integrate to the internet but also to the web. It allows the users to share and create content as well as provide capabilities for data aggregation and analysis through a network to become part of the World Wide Web (W3). Despite these advances, it has shown several security challenges that need to be addressed for the successful deployment of WoT on a commercially variable and large scale. In this paper, authors have analyzed the most noticeable security challenges related to WoT such as unauthorized access, eavesdropping, denial of service attack, tempering, and impersonating, through an analysis of already published empirical studies. Further, we have discussed some of the available mechanisms to overcome security related issues while taking into account the network size and mobility. Authors have used Threat analysis and attack modeling methods to inform the users about defensive measures and to prevent security threats from taking advantage of system flaws Authors have provided the necessary insight into how security can be improved by using certain existing mechanisms and algorithms. The findings of the study revealed that security mechanisms to secure WoT are still immature and future research is required to resolve these challenges.

中文翻译:

物联网:安全挑战和机制

物联网(WoT)是物联网(IoT)的改进和最有前途的基础架构,它使智能事物不仅可以集成到互联网,还可以集成到Web。它允许用户共享和创建内容,并通过网络提供数据聚合和分析的功能,从而成为万维网(W3)的一部分。尽管取得了这些进步,但它已经显示了在商业可变规模上成功部署WoT需要解决的一些安全挑战。在本文中,作者通过对已经发表的经验研究进行分析,分析了与WoT相关的最显着的安全挑战,例如未经授权的访问,窃听,拒绝服务攻击,调节和冒充。进一步,我们已经讨论了一些可用于解决安全性相关问题的机制,同时考虑了网络规模和移动性。作者使用了威胁分析和攻击建模方法,以向用户提供防御措施并防止安全威胁利用系统缺陷。作者提供了必要的见解,以了解如何通过使用某些现有的机制和算法来提高安全性。该研究的发现表明,用于保护WoT的安全机制仍不成熟,需要进一步的研究来解决这些挑战。作者使用了威胁分析和攻击建模方法,以向用户提供防御措施并防止安全威胁利用系统缺陷。作者提供了必要的见解,以了解如何通过使用某些现有的机制和算法来提高安全性。该研究的发现表明,用于保护WoT的安全机制仍不成熟,需要进一步的研究来解决这些挑战。作者使用了威胁分析和攻击建模方法,以向用户提供防御措施并防止安全威胁利用系统缺陷。作者提供了必要的见解,以了解如何通过使用某些现有的机制和算法来提高安全性。该研究的发现表明,用于保护WoT的安全机制仍不成熟,需要进一步的研究来解决这些挑战。
更新日期:2021-03-02
down
wechat
bug