چکیده
مقدمه
پیشینه اینترنت اشیا
به تهدیدات و آسیب پذیری ها حمله می کند
اقدامات متقابل
نتیجه
منابع
Abstract
Introduction
Background of IoT
Attacks threats and vulnerabilities
Countermeasures
Conclusion
References
چکیده
ادغام اینترنت اشیا در جهان محبوبیت فوق العاده ای در زمینه فناوری داشته است. این نوآوری بزرگ تحولی بینظیر در کسبوکار و تحول عملیات را امکانپذیر کرده است. با این حال، استفاده قابل توجه از این نوآوری همچنین یک تهدید امنیتی ایجاد می کند که به یک نقطه مهم نگرانی برای بسیاری از مشاغل در سراسر جهان تبدیل شده است. بسیاری از شرکتهایی که به اینترنت اشیا وابسته هستند با نقضها و تهدیدات امنیتی مواجه شدهاند. اقدامات متقابل اینترنت اشیا به خوبی مورد توجه قرار نگرفته است، که چالش مهم تری را برای بسیاری از سازمان هایی که به شدت به این فناوری متکی هستند، ایجاد می کند. در این نظرسنجی، ما یک نظرسنجی امنیتی را پیشنهاد میکنیم که به حل مشکلات مرتبط با اینترنت اشیا کمک میکند و راهحلهای امنیتی را در تمام لایههای اینترنت اشیا ارائه میدهد. نتایج نشان میدهد که احراز هویت حیاتیترین اقدام امنیتی برای پیادهسازی در اینترنت اشیا است.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.
Introduction
The internet of things (IoT) connects (heterogenous) physical devices to the internet, allowing information to be sent and received via the internet. In 1999, the concept of IoT was first used by Kevin Ashton (Ogonji et al., 2020). The IoT term has evolved into various technologies like sensors, real-time analysis, machine learning, and embedded systems. It’s all about the smart hospital idea and other devices controlled via wireless or fixed internet. Smart devices can acquire data and share data in everyday life to do the required task (Javaid & Khan, 2021). IoT applications apply to smart cities, devices, cars, connected healthcare, homes, and entertainment systems. According to cisco research, roughly 500 billion gadgets will use sensors and be connected to the internet by 2030.it is said that the IoT is the network that associates these devices for data communication (Aman et al., 2020; Alqallaf, 2021).
Conclusion
IoT innovation has had tremendous growth and revolution in the technology world. As with any network technology, it has had its security challenge. Security threats are still very prevalent in IoT systems. These threats have hindered its development from incorporating full-proof security systems. In this report, we have described and outlined the four layers of the IoT system and then highlighted the security threats associated with various layers.