اینترنت اشیا: چالش های بزرگ و فرصت های جدید
ترجمه نشده

اینترنت اشیا: چالش های بزرگ و فرصت های جدید

عنوان فارسی مقاله: کنترل دسترسی در اینترنت اشیا: چالش های بزرگ و فرصت های جدید
عنوان انگلیسی مقاله: Access control in the Internet of Things: Big challenges and new opportunities
مجله/کنفرانس: شبکه های کامپیوتری – Computer Networks
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، فناوری اطلاعات
گرایش های تحصیلی مرتبط: امنیت اطلاعات، اینترنت وشبکه های گسترده
کلمات کلیدی فارسی: اینترنت اشیا، امنیت، حریم خصوصی، کنترل دسترسی
کلمات کلیدی انگلیسی: Internet of Things، Security، Privacy، Access control
نوع نگارش مقاله: مقاله مروری (Review Article)
نمایه: Scopus – Master Journal List – JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.comnet.2016.11.007
دانشگاه: OSCARS Laboratory – Ensa of Marrakesh – Cadi Ayyad University – Morocco
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2017
ایمپکت فاکتور: 3/092 در سال 2017
شاخص H_index: 113 در سال 2019
شاخص SJR: 0/5 در سال 2017
شناسه ISSN: 1389-1286
شاخص Quartile (چارک): Q2 در سال 2017
فرمت مقاله انگلیسی: PDF
تعداد صفحات مقاله انگلیسی: 26
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
کد محصول: E10661
فهرست انگلیسی مطالب

Abstract


1- Introduction


2- A proposed (OM-AM) authorization reference model for IoT


3- Review of the literature within the OM-AM model


4- Analysis & evaluation


5- Discussion and open issues : authorization and access control challenges in IoT


6- Innovation trends and research future directions in IoT


7- Conclusion


References

نمونه متن انگلیسی مقاله

Abstract


In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An analysis of the security and privacy requirements for the most dominant IoT application domains, including Personal and home, Government and utilities, and Enterprise and industry, is conducted. The pros and cons of traditional, as well as recent access control models and protocols from an IoT perspective are highlighted. Furthermore, a qualitative and a quantitative evaluation of the most relevant IoT related-projects that represent the majority of research and commercial solutions proposed in the field of access control conducted over the recent years (2011- 2016) is achieved. Finally, potential challenges and future research directions are defined.


Introduction


Have you ever imagined your clothes, furniture, cars, household lights or even your coffee pots have their own Twitter accounts, interact with social networks and send data to the cloud, enabling aggregation of data from different devices and aspects of your lives? That is the era of The Internet of Things where the barriers between the real and cyber worlds are increasingly annihilated by turning out every day physical devices to smart objects. This is a huge and fundamental shift. When we start making things intelligent, it is going to be a great engine for creating new products and new services to improve peoples everyday lifestyle, spawn new businesses and make hospitals, factories, roads, airways, offices, retail stores and public buildings, smarter. So what will really happen when things that heretofore were blind and mute; talk, wash, hear and even think? These billions of devices are, actually, pervading our surrounding environment and even our bodies. For the sake of improving our lifestyle, they are tracking us and increasingly encroaching on our private and intimate spaces. Indeed, smart meters deduce when we shower, cars know when we do not go to work, wearable medical devices know our weight, and mobiles know how we feel [1]. As consequence, the success or fail-ure of this revolutionary evolution will be determined by two key challenges: security and privacy. Since lack of trust about privacy will result in decreased adoption among users. Actually, a study [2] about the future of digital trust released by orange has shown that 78% of consumers think that it is hard to trust companies when it comes to use their personal data. The EU Commissions public consultation on IoT governance and the FTCs latest debates have shown in a clear way that there is an urgent need for implementing security measures for minimizing the impact of a cyberattack and unlawful profiling and surveillance of individuals.

  • اشتراک گذاری در

دیدگاه خود را بنویسید:

تاکنون دیدگاهی برای این نوشته ارسال نشده است

اینترنت اشیا: چالش های بزرگ و فرصت های جدید
نوشته های مرتبط
مقالات جدید
نماد اعتماد الکترونیکی
پیوندها