首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

  相似文献   

2.
The Internet of Things (IoT) is a network of interconnected smart objects having capabilities that collectively form an ecosystem and enable the delivery of smart services to users. The IoT is providing several benefits into people's lives through the environment. The various applications that are run in the IoT environment offer facilities and services. The most crucial services provided by IoT applications are quick decision for efficient management. Recently, machine learning (ML) techniques have been successfully used to maximize the potential of IoT systems. This paper presents a systematic review of the literature on the integration of ML methods in the IoT. The challenges of IoT systems are split into two categories: fundamental operation and performance. We also look at how ML is assisting in the resolution of fundamental system operation challenges such as security, big data, clustering, routing, and data aggregation.  相似文献   

3.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   

4.

With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.

  相似文献   

5.
Home Internet of Things (IoT) services are expected to augment the efficiency and comfort of users’ daily lives; however, this expectation is eclipsed by concerns regarding privacy and vulnerability. While these concerns critically impact the acceptance of IoT services for the home, they have been discussed primarily from a traditional point of view; academic discussions of privacy and vulnerability in the current environment are lacking. This study extends existing privacy and vulnerability theories to demonstrate the importance of physical privacy and user vulnerability protections in home IoT environments. To validate the proposed research model, an empirical analysis was conducted on 265 samples with a partial least squares structural equation modeling technique. The differences in vulnerability factors, along with privacy concerns and resistance to home IoT services, were also compared by gender, experience, and type of housing. Results show that user vulnerability has the strongest impact on home IoT privacy concerns and resistance to home IoT environments. Additionally, this study found that personal factors appear differently across vulnerabilities, privacy concerns, and home IoT resistance. This study extends the traditional concepts of privacy and vulnerability to the home IoT environment.  相似文献   

6.
Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.  相似文献   

7.
The emergence of Internet of Things (IoT) is empowered by the availability of the high volume of smart sensors, Radio Frequency Identification, a suitable communication technologies and protocols. In the near future, the Internet will be full of heterogeneous connected devices. In recent years, the IoT has drawn significant attention as it can solve difficult problems. However, the heterogeneity of devices and the large scale networks expose the IoT to many challenges that must be addressed; otherwise, the systems performance will deteriorate. As an attempt to identify these challenges, this paper comprehensibly cites the main IoT concepts, the serious IoT challenges and the quality of services presented in the recent literature. It also investigates the corresponding main research directions and the proposed solutions. This paper can increase the knowledge of the reader since it is the first IoT survey that presents load balancing algorithms utilized in solving the extreme data storage challenge.  相似文献   

8.
9.
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which need to be addressed. To protect information about users’ location, an efficient technique should be devised. Several techniques have already been proposed for preserving location privacy in IoT. However, the existing research lags in preserving location privacy in IoT and has highlighted several issues such as being specific or being restricted to a certain location. In this paper, we propose a new location privacy technique called the enhanced semantic obfuscation technique (ESOT) to preserve the location information of a user. Experimental results show that ESOT achieves improved location privacy and service utility when compared with a well-known existing approach, the semantic obfuscation technique.  相似文献   

10.
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out.  相似文献   

11.
Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.  相似文献   

12.
物联网是一种能将物体连接至互联网使其更加智能的技术.但是物联网设备产生的大数据难以处理,网络架构的可扩展性差,以及用户的安全隐私容易泄露等问题都限制了物联网的发展.为了解决这些问题,通过分析雾计算所具有的优势提出基于雾计算的物联网架构.基于该架构,同时考虑到用户的安全隐私问题,又提出分层的网络架构.最后对文章进行总结和展望.  相似文献   

13.

Internet of things (IoT) has been a noteworthy zone of research for empowering interconnection and joining the physical world through the Internet. At the beginning, it was used for single things but later advancements in different computing devices resulted in a new terminology called the internet of computing (IoC). In this paper, we review the latest progresses on IoT with IoC from a class review of published articles from 2009 to 2017. The review is classified alongside with (1) identification of users who are already in existence, (2) devices connected via various communication modes, (3) deterministic communication in IoT. The reviewed approaches are named as empirical, computing, innovative application and implementation approaches. The review shows that data stored in the cloud need to be mapped with geographic information system in order to fit with IoT and IoC. For IoT versus traditional communication approaches, it is found that reliable connection is one of the most emerging issues nowadays. It has been concluded that for the social consensus, IoC and IoT cooperating together are truly beneficial for upcoming years rather than just devices equipped with many sensor technologies. We hope to draw attention to this new topic with trends in the forthcoming era.

  相似文献   

14.
In today’s Internet reliant services, the issue of users’ information privacy awareness is being raised. Despite the fact that in many cases internet users claim to be cognizant of privacy issues, they tend to jeopardize their privacy and take no actions to protection it. This paper reports a systematic literature review of existing studies related to Internet users’ information privacy awareness, towards enhancing respective initiatives and defining the attributes that a user should have so as to be privacy aware. We created a five-concept classification framework for the research topics that the academic community raises as important to be further investigated and the main challenges inhibiting information privacy awareness, and we classified all the selected papers according to this framework. Based on the analysis of the literature, we identify five main attributes that constitute a “Profile for the Information Privacy Aware User”, stemming from the classification framework, and further, we suggest the way this profile can be beneficial for internet users, Internet providers and designers of privacy awareness enhancing technologies. Additionally, we highlight research gaps and we provide useful insights for future research, such as the need for a concrete definition (theme 1), the need for the proposal of privacy preventive technologies (theme 3 and 4) and the need for investigation of information privacy awareness in multiple contexts (theme 5).  相似文献   

15.
Making the Internet of Things (IoT) a reality will contribute to extend the context-aware ability of numerous sensitive applications. We can foresee that the context of users will include not only their own spatio-temporal conditions but also those of the things situated in their ambient environment and at the same time, thanks to the IoT, those that are located in other remote spaces. Consequently, next-generation context managers have to interact with the IoT underlying technologies and must, even more than before, address both privacy and quality of context (QoC) requirements. In this article, we show that the notions of privacy and QoC are intimately related and sometimes contradictory and survey the recent works addressing them. Current solutions usually consider only one notion, and very few of them started to bridge privacy and QoC. We identify some of the remaining challenges that next-generation context managers have to deal with to favour users’ acceptability by providing both the optimal QoC level and the appropriate privacy protection.  相似文献   

16.
The Internet of thing (IoT) emerges as a possible solution to realize a smart life in the modern age. In this article, we design and realize a novel near field communication (NFC)-driven smart home system for IoT, which integrates the wireless sensor network (WSN), social networks, and the cloud computing. NFC technology provides a way for users to exchange information between them and the system by simply contacting. So, we propose to use NFC as the system drive in the architecture, such that users can intuitively interact with the system and deliver their intentions. Then, the corresponding service over the system will control or adjust the things at home to fit users' needs. Furthermore, the proposed system provides a platform for developers to easily and rapidly implement their smart home related services. In the system, WSN sensing and control, NFC communications and identification, user profile management and preference analysis, and social network integration are all provided as platform services. We will show how the system works for home automation, intruder detection, and social network sharing.  相似文献   

17.
The Internet of Things (IoT) is a system that includes smart items with different sensors, advanced technologies, analytics, cloud servers, and other wireless devices that integrate and work together to create an intelligent environment that benefits end users. With its wide spectrum of applications, IoT is revolutionizing both the current and future generations of the Internet. IoT systems can be employed for broad-ranging real applications, such as agriculture, the environment, cities, healthcare, and the industrial sector. In this paper, we briefly discuss the three-tier architectural view of IoT, its different communication technologies, and the smart sensors. Moreover, we study various application areas of IoT such as the environmental domain, healthcare, agriculture, smart cities, and industrial, commercial, and general aspects. A critical analysis is shown for the existing schemes and techniques related to this work. Further, this paper addresses the basic context, tools and evaluation approaches, future scope, and the advantages and disadvantages of the aforestated IoT applications. A comprehensive analysis is provided for each domain along with its fundamental parameters like the quality of service (QoS), network longevity, scalability, energy efficiency, accuracy, and cost. Finally, this study highlights the technical challenges and open research problems existing in different IoT applications.  相似文献   

18.
This study presents a case application of a socio-technical framework to assess and predict the development of the Internet of Things (IoT) in Korea. Applying a socio-technical system approach to the IoT, this paper seeks a clear understanding of how the IoT will evolve and stabilize in a smart environment. It investigates the complex interaction between social and technical aspects of the IoT, by highlighting the co-evolution, interaction, and interface, which constitute the next generation network environment. It describes the challenges in designing, deploying, and sustaining the diverse components of the IoT, and provides a snapshot of Korea’s current approach to meeting this challenge. Finally, the findings of this study provide insights into these challenges and opportunities, by offering a socio-technical analysis of IoT development. The insights help to conceptualize how the IoT can be designed and situated within human-centered contexts.  相似文献   

19.

Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.

  相似文献   

20.

Nowadays, next-generation networks such as the Internet of Things (IoT) and 6G are played a vital role in providing an intelligent environment. The development of technologies helps to create smart city applications like the healthcare system, smart industry, and smart water plan, etc. Any user accesses the developed applications; at the time, security, privacy, and confidentiality arechallenging to manage. So, this paper introduces the blockchain-defined networks with a grey wolf optimized modular neural network approach for managing the smart environment security. During this process, construction, translation, and application layers are created, in which user authenticated based blocks are designed to handle the security and privacy property. Then the optimized neural network is applied to maintain the latency and computational resource utilization in IoT enabled smart applications. Then the efficiency of the system is evaluated using simulation results, in which system ensures low latency, high security (99.12%) compared to the multi-layer perceptron, and deep learning networks.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号