{"title":"物联网(IoT)环境下安全风险调查","authors":"Mugesh Ravi","doi":"10.53409/mnaa.jcsit20201201","DOIUrl":null,"url":null,"abstract":"This analysis reviews the management of vulnerabilities and security risks of Internet of Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth and how it has transformed our lives in various, unforeseen dimensions and how it has given rise to IoT. The introduction part focuses on providing an analysis on literature by presenting a short IoT history, some technical information on security protocols, and IoT hardware problems. The section on survey is where similar literatures on specific concepts are reviewed by describing the vulnerabilities and threats of IoT systems, and then reviewed risk management mechanisms for both information technologies and information protection. After the review, the analysis and discussion segment addressed and evaluated the details contained in the literature review. In this paper, a new risk management strategy uniquely designed for each IoT system is proposed. Then proposed work is evaluated by discussing the advantages and concluded the analysis and the future work.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Survey on Security Risks in Internet of Things (IoT) Environment\",\"authors\":\"Mugesh Ravi\",\"doi\":\"10.53409/mnaa.jcsit20201201\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This analysis reviews the management of vulnerabilities and security risks of Internet of Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth and how it has transformed our lives in various, unforeseen dimensions and how it has given rise to IoT. The introduction part focuses on providing an analysis on literature by presenting a short IoT history, some technical information on security protocols, and IoT hardware problems. The section on survey is where similar literatures on specific concepts are reviewed by describing the vulnerabilities and threats of IoT systems, and then reviewed risk management mechanisms for both information technologies and information protection. After the review, the analysis and discussion segment addressed and evaluated the details contained in the literature review. In this paper, a new risk management strategy uniquely designed for each IoT system is proposed. Then proposed work is evaluated by discussing the advantages and concluded the analysis and the future work.\",\"PeriodicalId\":125707,\"journal\":{\"name\":\"Journal of Computational Science and Intelligent Technologies\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computational Science and Intelligent Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.53409/mnaa.jcsit20201201\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computational Science and Intelligent Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53409/mnaa.jcsit20201201","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Security Risks in Internet of Things (IoT) Environment
This analysis reviews the management of vulnerabilities and security risks of Internet of Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth and how it has transformed our lives in various, unforeseen dimensions and how it has given rise to IoT. The introduction part focuses on providing an analysis on literature by presenting a short IoT history, some technical information on security protocols, and IoT hardware problems. The section on survey is where similar literatures on specific concepts are reviewed by describing the vulnerabilities and threats of IoT systems, and then reviewed risk management mechanisms for both information technologies and information protection. After the review, the analysis and discussion segment addressed and evaluated the details contained in the literature review. In this paper, a new risk management strategy uniquely designed for each IoT system is proposed. Then proposed work is evaluated by discussing the advantages and concluded the analysis and the future work.