首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.  相似文献   

2.
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT‐centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT‐related vulnerabilities. This article is a multi‐fold survey that emphasizes on understanding the crucial causes of novel vulnerabilities in IoT paradigms and issues in existing research. Initially, we have emphasized on different layers of IoT architecture and highlight various emerging security challenges associated with each layer along with the key issues of different IoT systems. Secondly, we discuss the exploitation, detection, and defense methodologies of IoT malware‐enabled distributed denial of service (DDoS), Sybil, and collusion attack capabilities. We have also discussed numerous state‐of‐the‐art strategies for intrusion detection and methods for IDS setup in future IoT systems. Third, we have presented a brief classification of existing IoT authentication protocols and a comparative analysis of such protocols based on different IoT‐enabled cyber attacks. For conducting a real‐time future IoT research, we have presented some emerging blockchain solutions. We have also discussed a comparative examination of some of the recently developed simulation tools and IoT test beds that are characterized based on different layers of IoT infrastructure. We have also outlined some of the open issues and future research directions and also facilitate the readers with broad classification of existing surveys in this domain that addresses several scopes related to the IoT paradigm. This survey article focuses in enabling IoT‐related research activities by comparing and merging scattered surveys in this domain.  相似文献   

3.
IoT clusters arise from natural human societal clusters such as a house, an airport, and a highway. IoT clusters are heterogeneous with a need for device to device as well as device to user trust. The IoT devices are likely to be thin computing clients. Due to low cost, an individual IoT device is not built to be fault tolerant through redundancy. Hence the trust protocols cannot take the liveness of a device for granted. In fact, the differentiation between a failing device and a malicious device is difficult from the trust protocol perspective. We present a minimal distributed trust layer based on distributed consensus like operations. These distributed primitives are cast in the context of the APIs supported by a trusted platform module (TPM). TPM with its 1024 bit RSA is a significant burden on a thin IoT design. We use RNS based slicing of a TPM where in each slice resides within a single IoT device. The overall TPM functionality is distributed among several IoT devices within a cluster. The VLSI area, energy, and time savings of such a distributed TMP implementation is assessed. A sliced/distributed TPM is better suited for an IoT environment based on its resource needs. We demonstrate over 90% time reduction, over 3% area reduction, and over 90% energy reduction per IoT node in order to support TPM protocols.  相似文献   

4.
张兴  黄宇  王文博 《电信科学》2012,28(8):96-104
从物联网的概念提出至今,政产学研用各界大力投入物联网的研究和建设工作中.当前,物联网主要集中在传统的技术设计和行业应用方面,作为信息技术产业的重要组成部分,其建设和发展必然受到能源和成本问题的制约,绿色节能也是目前关注较少的一个领域.为从根本上理清物联网目前存在的能耗问题,为建设高能效的绿色物联网提供理论依据,本文首先介绍了绿色物联网的基本概念,对绿色物联网的发展进行了分析,然后根据物联网的发展需求,结合我国物联网的发展现状,对当前绿色物联网各层的能耗构成进行了具体分析,总结了产业界和学术界在绿色物联网方面的推动工作;同时以物联网的层次关系为出发点,对绿色物联网各层的绿色节能和能效优先设计技术进行了深入分析和梳理,然后结合物联网层次关系给出了当前研究界对绿色物联网研究的各个环节的主要技术,最后对绿色物联网的未来发展进行了总结和展望.  相似文献   

5.
The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. In this paper, we examine, review and present the current IoT technologies starting from the physical layer to the application and data layer. Additionally, we focus on future IoT key enabling technologies like the new fifth generation (5G) networks and Semantic Web. Finally, we present main IoT application domains like smart cities, transportation, logistics, and healthcare.  相似文献   

6.
The Internet of Things (IoT) is a system that includes smart items with different sensors, advanced technologies, analytics, cloud servers, and other wireless devices that integrate and work together to create an intelligent environment that benefits end users. With its wide spectrum of applications, IoT is revolutionizing both the current and future generations of the Internet. IoT systems can be employed for broad-ranging real applications, such as agriculture, the environment, cities, healthcare, and the industrial sector. In this paper, we briefly discuss the three-tier architectural view of IoT, its different communication technologies, and the smart sensors. Moreover, we study various application areas of IoT such as the environmental domain, healthcare, agriculture, smart cities, and industrial, commercial, and general aspects. A critical analysis is shown for the existing schemes and techniques related to this work. Further, this paper addresses the basic context, tools and evaluation approaches, future scope, and the advantages and disadvantages of the aforestated IoT applications. A comprehensive analysis is provided for each domain along with its fundamental parameters like the quality of service (QoS), network longevity, scalability, energy efficiency, accuracy, and cost. Finally, this study highlights the technical challenges and open research problems existing in different IoT applications.  相似文献   

7.
Internet of Things (IoT) has very remarkable advantages over customary communication technologies. However, IoT suffers from different issues, such as limited battery life, low storage capacity, and little computing capacity. For this reason, in many IoT applications and devices, we require an alternative unit to execute the tasks from the user's device and return results. In general, the problem of limited resources by transferring the computation workload to other devices/systems with better resources is addressed by offloading computation. It can be focused on improving the application, extending battery life, or expanding storage capacity. The offloading operation can be performed based on various quality of service (QoS) parameters that contain computational demands for load balancing, response time, application, energy consumption, latency, and other things. Moreover, the systematic literature review (SLR) method is used to identify, assess, and integrate findings from all relevant studies that address one or more research questions on IoT offloading and conduct a comprehensive study of empirical research on offloading techniques. However, we present a new taxonomy for them based on offloading decision mechanisms and overall architectures. Furthermore, we offer a parametric comparison for the offloading methods. As well, we present the future direction and research opportunities in IoT offloading computation. This survey will assist academics and practitioners to directly understand the progress in IoT offloading.  相似文献   

8.
Mobile nodes arouse new challenges that expand the performance in those environments. The nodes of Internet of Things (IoT) generate a large amount of data, which have to be stored and processed in a seamless and interpretable form by indexing. Therefore, indexing is a challenge in IoT, particularly when the nodes are mobile. The current indexing techniques dedicated to mobile environments are unsatisfying because the data are transmitted from different locations within different time periods and randomness of sensor movement. Although huge research efforts have been dedicated to this subject amid the last decades, little consideration has been paid for the research summarization and guidance. The objective of this survey is to identify the relationship between activities of mobile sensors in the context of IoT, that concerned on transferring and collecting data as well as the effectiveness of indexing techniques. The contribution of this review is to investigate the techniques of mobile IoT nodes, to find the source of challenges that adversely affect the index effectiveness. In‐depth investigation and analyses of approaches to apply IoT mobile nodes will enable the researcher to understand the behavior of mobile environments to extract the deformities that adversely affect the indexing effectiveness. The analyzed approaches are meta‐heuristic, spatial‐temporal indexing, and prediction model approach. Each approach is analyzed by discussing the features and limitations from the mobility perspectives. Furthermore, the indexing techniques are analyzed according to their features and limitations and mobile IoT indexing requirements. In conclusion, recognize and contemplate different open issues that got little focus or still unknown at this point.  相似文献   

9.
The challenge raised by the introduction of Internet of Things (IoT) concept will permanently shape the networking and communications landscape and will therefore have a significant social impact. The ongoing IoT research activities are directed towards the definition and design of open architectures and standards, but there are still many issues requiring a global consensus before the final deployment. The paper presents and discusses the IoT architectural frameworks proposed under the ongoing standardization efforts, design issues in terms of IoT hardware and software components, as well as the IoT application domain representatives, such as smart cities, healthcare, agriculture, and nano-scale applications (addressed within the concept of Internet of Nano-Things). In order to obtain the performances related to recently proposed protocols for emerging Industrial Internet of Things applications, the preliminary results for Message Queuing Telemetry Transport and Time-Slotted Channel Hopping protocols are provided. The testing was performed on OpenMote hardware platform and two IoT operating systems: Contiki and OpenWSN.  相似文献   

10.
Stimulus-responsive materials with designable integrated functions bridge the intelligent systems in future lifestyles with the Internet of Things (IoT). The growing trend for IoT and corresponding advanced devices will involve a great number of electronic disposables, which may place heavy burdens on the environment. Here, an elaborately designed multistage responsive material is reported for real-time, reversible light-writing based on organized stage-by-stage responsive behaviors and polarity-dependent physicochemical fluorescence response, where the stimulus is accurately delivered through a completely reversible “light-heat-fluorescence” pathway. The resulted materials can be pollution-freely written by hand-controlled near-infrared laser within 5 s, spontaneously erased within 20 s, and exhibit excellent re-writing ability (more than 5000 times while the variance of chromaticity coordinates <0.0008), which is difficult to achieve by traditional laser writing technologies. This study is a step toward high-performance long-life functional devices based on reversible multistage responsive materials for future IoT lifestyles.  相似文献   

11.
Wireless Personal Communications - In this paper, we introduce a survey of routing protocols for inter- net of things (IoT). We provide an overview of hardware and software plat- forms for IoT...  相似文献   

12.
The Internet of Things (IoT) presents opportunities to address a variety of systemic, metabolic healthcare issues. Cardiovascular disease and diabetes are among the greatest contributors to premature death worldwide. Wireless wearable continuous monitoring systems such as ECG sensors connected to the IoT can greatly decrease the risk of death related to cardiac issues by providing valuable long-term information to physicians, as well as immediate contact with emergency services in the event of a heart attack or stroke. In this report we discuss the fabrication, characterization and validation of composite fabric ECG sensors made from Nylon® coated with reduced graphene oxide (rGOx) as part of a self-powered wearable IoT sensor. We utilize an electronic probing station to measure electrical properties, take live ECG data to measure signal reliability, and provide detailed surface characterization through scanning electron microscopy. Finally, bonding between the layers of the composite and between composite and the Nylon® is analyzed by Fourier transform Infrared spectroscopy. Furthermore, a low power analog front end circuit designed in 65 nm CMOS process is presented to interface the sensor with a system on chip used in a wearable IoT healthcare device.  相似文献   

13.
物联网是一种虚拟网络与现实世界实时交互的新型系统,随着物联网技术的迅猛发展,物联网终端的安全问题也逐渐被重视。文中通过分析物联网终端设备存在的认证、私隐等安全问题,针对终端设备计算能力、网络资源有限的特点,研究了基于IBE密钥参数协商和身份鉴别技术、轻量级加密算法和密码自同步技术,提出了将几种技术相结合的加密技术方案,并对这种方案的安全性进行了分析。  相似文献   

14.
In this paper, a routing algorithm to optimize the selection of the best path for the transmitted data within the Internet of Things (IoT) system is proposed. The algorithm controls the use of ant colony ideas in the IoT system to obtain the best routing benefit. It divides the IoT environment into categorized areas depending on network types. Then, it applies the most suitable ant colony algorithm to the concerned network within each area. Furthermore, the algorithm considers routing problem in intersected areas that may arise in case of IoT system. Finally, Network Simulator 2 is used to evaluate the proposed algorithm performance. Simulation results demonstrate the effectiveness of the proposed routing algorithm in terms of end‐to‐end delay, packet loss ratio, bandwidth consumption, throughput, overhead of control bits, and energy consumption ratio. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

15.
Internet expansion affects currently diverse entities on the physical world and daily life. The democratization of the technology called Internet of Things (IoT) brings back many problems associated with the security of the transmitted data, autonomy, and ease of use, with the central constraint of gathering momentum. The use of an embedded development platform for IoT operating through Wi‐Fi and cloud technology is in our case the solution that fits the internet model objects for wearable health care application. This work involves the study and implementation of wearable IoT secure solution dedicated to health care devoted to old and dependent people. The proposed hardware, powered by solar cells, operate through smart sleep and wake up events. The relevant part of the developed IoT operating software exploits the multiagent behavior. Case study, based on the exploitation of the Electric Imp platform, is proposed.  相似文献   

16.
Honeypot Internet of Things (IoT) (HIoTPOT) keep a secret eye on IoT devices and analyzes the various recent threats which are dangerous to IoT devices. In this paper, implementation of a research honeypot is presented which is used to learn the recent tactics and ethics used by black hat community to attack on IoT devices. As IoT is open and easy for accessing, all the intruders are highly attracted towards IoT. Recently Telnet based attacks are very famous on IoT devices to get easy access and attack on other devices. To reduce these kinds of threats, it is necessary to know in details about intruder, therefore the aim of this research work is to implement novel based secret eye server known as HIoTPOT which will make the IoT environment more safe and secure.  相似文献   

17.
物联网公共服务平台是为种类繁多的物联网应用提供公共服务的业务运营和管理系统,它担负着提升物联网跨领域服务规模化与协同化的使命,是未来物联网应用的发展方向。本文探讨了目前物联网公共服务平台的现状,以及与公共服务特性紧密相关的平台测试方法。  相似文献   

18.
The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer.According to the current security deficiencies in IoT gateway,a universal IoT gateway security system was proposed based on the IoT gateway middleware technology.Various security protocols or algorithms can be embedded in IoT gateway security system,and the modeling and analysis can help the design and implementation of IoT gateway.The formal modeling and verification of the IoT gateway security system was performed by timed automata.The results show that the IoT gateway security system satisfies the security properties of confidentiality,availability,authenticity,robustness,integrity and freshness.  相似文献   

19.
赵子奇 《电子测试》2021,(5):79-80,78
在物联网体系中低速率物联网的应用比例较大。低速率物联网具有成本低和消耗低优势。物联网技术人员为满足低速率物联网的应用要求,陆续研发了Cat.M和NB-Iot等系统,推动了低速率物联网的可持续发展,帮助人们深刻理解低速率物联网技术。  相似文献   

20.

Recently, NB-IoT, LTE Cat-M1, Sigfox, and LoRa have been proposed as promising Low-Power Wide Area Networks (LPWANs) technologies for Internet-of-Things (IoT) applications. These technologies are aimed for IoT applications such as smart meters that can tolerate long transmission delays and only need a narrow band to periodically transmit a small amount of data. Although the performances of these technologies have been studied or compared in the literature, most comparisons were conducted in non-mobile conditions. In this work, we used a drone flying at 70 km/hr along a 10 km motorway to act as a mobile IoT end device to do the performance measurements. In this paper, we report and compare the performances of these technologies in such high-speed mobile conditions in the air.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号