{"title":"物联网安全:ZWave和线程","authors":"Ishaq Unwala, Z. Taqvi, Jiang Lu","doi":"10.1109/GREENTECH.2018.00040","DOIUrl":null,"url":null,"abstract":"This paper reviews the security aspects of two Internet-of-Things (IoT) protocols, Z-Wave and Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while Thread is one of the most recent protocols. As millions of IoT systems are installed for home and industrial automation, the security of these IoT systems is a concern. There is a potential for these IoT systems to be misused. This paper looks at security challenges for an IoT system. The security features of the IoT systems are spread across many parts of the IoT protocols. Paper discusses different attacks types on the IoT systems and the manners in which the protocols handle them. One of the most venerable times for an IoT system is when a new device is added to the IoT system. To avoid an intruder from getting access, the new device must be authenticated. Authentication of new network devices is discussed for both the protocols. IoT protocols are complex and the security aspects are also very complex, this paper should serve as a starting point to further study these and other IoT protocols.","PeriodicalId":387970,"journal":{"name":"2018 IEEE Green Technologies Conference (GreenTech)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"IoT Security: ZWave and Thread\",\"authors\":\"Ishaq Unwala, Z. Taqvi, Jiang Lu\",\"doi\":\"10.1109/GREENTECH.2018.00040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper reviews the security aspects of two Internet-of-Things (IoT) protocols, Z-Wave and Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while Thread is one of the most recent protocols. As millions of IoT systems are installed for home and industrial automation, the security of these IoT systems is a concern. There is a potential for these IoT systems to be misused. This paper looks at security challenges for an IoT system. The security features of the IoT systems are spread across many parts of the IoT protocols. Paper discusses different attacks types on the IoT systems and the manners in which the protocols handle them. One of the most venerable times for an IoT system is when a new device is added to the IoT system. To avoid an intruder from getting access, the new device must be authenticated. Authentication of new network devices is discussed for both the protocols. IoT protocols are complex and the security aspects are also very complex, this paper should serve as a starting point to further study these and other IoT protocols.\",\"PeriodicalId\":387970,\"journal\":{\"name\":\"2018 IEEE Green Technologies Conference (GreenTech)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Green Technologies Conference (GreenTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GREENTECH.2018.00040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Green Technologies Conference (GreenTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GREENTECH.2018.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper reviews the security aspects of two Internet-of-Things (IoT) protocols, Z-Wave and Thread. Z-Wave is one of the oldest and most commercially successful IoT protocol, while Thread is one of the most recent protocols. As millions of IoT systems are installed for home and industrial automation, the security of these IoT systems is a concern. There is a potential for these IoT systems to be misused. This paper looks at security challenges for an IoT system. The security features of the IoT systems are spread across many parts of the IoT protocols. Paper discusses different attacks types on the IoT systems and the manners in which the protocols handle them. One of the most venerable times for an IoT system is when a new device is added to the IoT system. To avoid an intruder from getting access, the new device must be authenticated. Authentication of new network devices is discussed for both the protocols. IoT protocols are complex and the security aspects are also very complex, this paper should serve as a starting point to further study these and other IoT protocols.