{"title":"物联网(IoT)安全和隐私问题:概述","authors":"Y. O. Mosud, E. Ajulo, A. Yinusa","doi":"10.22624/aims/csean-smart2023p7","DOIUrl":null,"url":null,"abstract":"The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7","PeriodicalId":409325,"journal":{"name":"Advances in Multidisciplinary and scientific Research Journal Publication","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Internet of Things (IoT) Security and Private Concerns: An Overview\",\"authors\":\"Y. O. Mosud, E. Ajulo, A. Yinusa\",\"doi\":\"10.22624/aims/csean-smart2023p7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7\",\"PeriodicalId\":409325,\"journal\":{\"name\":\"Advances in Multidisciplinary and scientific Research Journal Publication\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Multidisciplinary and scientific Research Journal Publication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22624/aims/csean-smart2023p7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Multidisciplinary and scientific Research Journal Publication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22624/aims/csean-smart2023p7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
在过去的二十年中,物联网(IoT)应用的数量大大增加。全球有超过5亿个电子设备连接在一起。由于物联网与互联网的持续连接,物联网应用程序经常成为各种传统威胁的目标,例如特洛伊木马、蠕虫、恶意软件、间谍软件和恶意代码注入。很明显,传统威胁提供诸如问责制、授权、身份验证之类的服务,这些因素通常用于识别主题并确定该人是否有资格访问对象。随着大量连接设备的出现,物联网系统可能更容易受到高频电磁辐射和更高级病毒的威胁和攻击。因此,迫切需要解决这些隐私和安全问题,因为依靠目前使用的传统程序是不够的。本研究通过探索物联网设备容易受到的各种危险、这些危险如何运作并创建恢复机制来减轻危害,确定了该领域的知识和研究空白。该研究最后提出了一些先进的身份验证方法,如一次性密码(OTP)基于ID和密码、三因素/多因素和区块链。Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B.(2023):物联网(IoT)安全与隐私问题:概述。尼日利亚网络安全会议论文集。尼日利亚陆军资源中心(NARC),尼日利亚阿布贾,2023年7月11日至12日。第49-58页https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7
Internet of Things (IoT) Security and Private Concerns: An Overview
The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7