{"title":"物联网安全挑战与解决方案综述","authors":"Farhad Mehdipour","doi":"10.1109/JAC-ECC51597.2020.9355854","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is exponentially growth, however privacy and security vulnerabilities are major concerns against rapid adoption of this technology. Due to mainly its decentralized topology and the resource constraints of the majority of its devices, conventional security and privacy approaches are inapplicable for IoT. Interaction and communication between a large number of devices in a secure way is possible, but it can be expensive, time-consuming, and complex. Thus, there is a need for new security models rather than the current ones which are mostly centralized. This paper provides an overview of IoT architectural layers and components, security issues and challenges at different layers, some solutions, and future directions.","PeriodicalId":146890,"journal":{"name":"2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Review of IoT Security Challenges and Solutions\",\"authors\":\"Farhad Mehdipour\",\"doi\":\"10.1109/JAC-ECC51597.2020.9355854\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is exponentially growth, however privacy and security vulnerabilities are major concerns against rapid adoption of this technology. Due to mainly its decentralized topology and the resource constraints of the majority of its devices, conventional security and privacy approaches are inapplicable for IoT. Interaction and communication between a large number of devices in a secure way is possible, but it can be expensive, time-consuming, and complex. Thus, there is a need for new security models rather than the current ones which are mostly centralized. This paper provides an overview of IoT architectural layers and components, security issues and challenges at different layers, some solutions, and future directions.\",\"PeriodicalId\":146890,\"journal\":{\"name\":\"2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)\",\"volume\":\"231 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JAC-ECC51597.2020.9355854\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JAC-ECC51597.2020.9355854","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet of Things (IoT) is exponentially growth, however privacy and security vulnerabilities are major concerns against rapid adoption of this technology. Due to mainly its decentralized topology and the resource constraints of the majority of its devices, conventional security and privacy approaches are inapplicable for IoT. Interaction and communication between a large number of devices in a secure way is possible, but it can be expensive, time-consuming, and complex. Thus, there is a need for new security models rather than the current ones which are mostly centralized. This paper provides an overview of IoT architectural layers and components, security issues and challenges at different layers, some solutions, and future directions.