物联网的架构和安全考虑

M. Gomba, B. Nleya
{"title":"物联网的架构和安全考虑","authors":"M. Gomba, B. Nleya","doi":"10.1109/GWS.2017.8300477","DOIUrl":null,"url":null,"abstract":"The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of \"the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Architecture and security considerations for Internet of Things\",\"authors\":\"M. Gomba, B. Nleya\",\"doi\":\"10.1109/GWS.2017.8300477\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of \\\"the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.\",\"PeriodicalId\":380950,\"journal\":{\"name\":\"2017 Global Wireless Summit (GWS)\",\"volume\":\"112 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Global Wireless Summit (GWS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GWS.2017.8300477\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Global Wireless Summit (GWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GWS.2017.8300477","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

当前的IP和其他网络(如电力智能电网)正在快速发展,从而产生了多种连接方法。这导致了物联网(IoT)方法论的出现,其目标是将当前的IP和相关网络转变为机器对机器(M-2-M)的基础。它将通过嵌入不同类型智能传感器的物理对象无缝连接全球和网络空间,这将导致超过200亿个与互联网连接的对象和传感器(物)产生和交换大量数据(到2020年),b[1]。由此产生的结构将有利于人类,帮助我们做出艰难的决定,并提供有益的服务。在本文中,我们概述了物联网架构以及物联网相关对象和设备的安全性。我们将首先描述广义物联网和安全架构,以及构成它们的各种元素如何相互作用。我们描述了一种方法,允许通过强大的加密和身份验证来保护受约束和不受约束的物联网设备,这样两者都可以从相同的安全框架中平等地利用,但仍然保持低计算负载,避免过度的计算操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Architecture and security considerations for Internet of Things
The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信