امنیت اینترنت اشیا: راه حل های بلاک چین
ترجمه نشده

امنیت اینترنت اشیا: راه حل های بلاک چین

عنوان فارسی مقاله: امنیت اینترنت اشیا: مرور، راه حل های بلاک چین و باز کردن چالش ها
عنوان انگلیسی مقاله: IoT security: Review, blockchain solutions, and open challenges
مجله/کنفرانس: نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، فناوری اطلاعات
گرایش های تحصیلی مرتبط: امنیت اطلاعات، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
کلمات کلیدی فارسی: امنیت IoT، بلاک چین، پروتکل های IoT، امنیت شبکه، امنیت داده ها
کلمات کلیدی انگلیسی: IoT security, Blockchain, IoT protocols, Network security, Data security
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.future.2017.11.022
دانشگاه: Bahauddin Zakariya University Multan – Pakistan
صفحات مقاله انگلیسی: 17
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2018
ایمپکت فاکتور: 4.639 در سال 2017
شاخص H_index: 85 در سال 2019
شاخص SJR: 0.844 در سال 2019
شناسه ISSN: 0167-739X
شاخص Quartile (چارک): Q1
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
کد محصول: E6519
فهرست مطالب (انگلیسی)

Abstract

1- Introduction

2- IoT architecture and security challenges

3- Categorization of security issues

4- Security solutions for IoT

5- Blockchain solutions for IoT security

6- Open challenges and future research directions

7- Conclusion

References

بخشی از مقاله (انگلیسی)

Abstract

With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.

Introduction

With the rapid growth of smart devices and high speed networks, the Internet of Things (IoT) has gained wide acceptance and popularity as the main standard for low-power lossy networks (LLNs) having constrained resources. It represents a network where ‘‘things’’ or embedded devices having sensors are interconnected through a private or a public network [1,2]. The devices in IoT can be controlled remotely to perform the desired functionality. The information sharing among the devices then takes place through the network which employs the standard protocols of communication. The smart connected devices or ‘‘things’’ range from simple wearable accessories to large machines, each containing sensor chips. For instance, the Lenovo smart shoes contain chips which provide support of tracking and analyzing fitness data [3]. Similarly, the electrical appliances including washing machines, and refrigerators can be controlled remotely through IoT. The security cameras installed for surveillance of a location can be monitored remotely anywhere in the world. Apart from the personal use, IoT serves the community needs as well. Various smart devices which perform diverse functionalities such as monitoring surgery in hospitals, detecting weather conditions, providing tracking and connectivity in automobiles, and identification of animals using biochips are already serving the community specific needs [4]. The data collected through these devices may be processed in real-time to improve efficiency of the entire system.