{"title":"免授权ISM频段物联网专用网络安全调研","authors":"E. Kail, Anna Bánáti, L. Erdődi, M. Kozlovszky","doi":"10.1109/SACI.2018.8440945","DOIUrl":null,"url":null,"abstract":"The world of IoT (Internet of Things) and IoT usability has been experienced an explosive development in the last few years. Several solutions have been used to overcome the different requirements for IoT applications based on already existing technologies e.g.: cellular networks, RFID, etc., whilst giving rise to a technology called dedicated IoT networks (SigFox, LoRa, Weightless Ingenu, etc.). Also, IoT usage area has been increased from smart grid networks to smart cities, healthcare or smart wear usage and even to IIoT (Industrial Internet of Things) applications. Nowadays the usage capabilities can hardly be localized with boundaries always newer and newer ideas are coming. This paper gives some hint why new technologies are evolved, what are their limitations with also giving an insight of the most prevalent security vulnerabilities for IoT networks and the analysis for the above-mentioned technologies respect to them.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands\",\"authors\":\"E. Kail, Anna Bánáti, L. Erdődi, M. Kozlovszky\",\"doi\":\"10.1109/SACI.2018.8440945\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The world of IoT (Internet of Things) and IoT usability has been experienced an explosive development in the last few years. Several solutions have been used to overcome the different requirements for IoT applications based on already existing technologies e.g.: cellular networks, RFID, etc., whilst giving rise to a technology called dedicated IoT networks (SigFox, LoRa, Weightless Ingenu, etc.). Also, IoT usage area has been increased from smart grid networks to smart cities, healthcare or smart wear usage and even to IIoT (Industrial Internet of Things) applications. Nowadays the usage capabilities can hardly be localized with boundaries always newer and newer ideas are coming. This paper gives some hint why new technologies are evolved, what are their limitations with also giving an insight of the most prevalent security vulnerabilities for IoT networks and the analysis for the above-mentioned technologies respect to them.\",\"PeriodicalId\":126087,\"journal\":{\"name\":\"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SACI.2018.8440945\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI.2018.8440945","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands
The world of IoT (Internet of Things) and IoT usability has been experienced an explosive development in the last few years. Several solutions have been used to overcome the different requirements for IoT applications based on already existing technologies e.g.: cellular networks, RFID, etc., whilst giving rise to a technology called dedicated IoT networks (SigFox, LoRa, Weightless Ingenu, etc.). Also, IoT usage area has been increased from smart grid networks to smart cities, healthcare or smart wear usage and even to IIoT (Industrial Internet of Things) applications. Nowadays the usage capabilities can hardly be localized with boundaries always newer and newer ideas are coming. This paper gives some hint why new technologies are evolved, what are their limitations with also giving an insight of the most prevalent security vulnerabilities for IoT networks and the analysis for the above-mentioned technologies respect to them.