{"title":"物联网设备的分散和可扩展安全性","authors":"Munkenyi Mukhandi","doi":"10.1145/3485730.3492901","DOIUrl":null,"url":null,"abstract":"Advancements in IoT technology has provided great benefits, unfortunately, IoT adoption also causes an increase in the attack surface which intensify security risks. As a consequence, different types of IoT smart devices have become the main targets of many high-profile cyber-attacks. To safeguard against threats such as introduction of fake IoT nodes and identity theft, the IoT needs scalable and resilient device authentication management. Contrary to existing mechanisms for IoT device authentication which are unsuitable for huge number of devices, my research focuses on decentralised and distributed security mechanisms that will improve current protocols such as Oauth2, GDOI and GNAP.","PeriodicalId":356322,"journal":{"name":"Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Decentralised and Scalable Security for IoT Devices\",\"authors\":\"Munkenyi Mukhandi\",\"doi\":\"10.1145/3485730.3492901\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advancements in IoT technology has provided great benefits, unfortunately, IoT adoption also causes an increase in the attack surface which intensify security risks. As a consequence, different types of IoT smart devices have become the main targets of many high-profile cyber-attacks. To safeguard against threats such as introduction of fake IoT nodes and identity theft, the IoT needs scalable and resilient device authentication management. Contrary to existing mechanisms for IoT device authentication which are unsuitable for huge number of devices, my research focuses on decentralised and distributed security mechanisms that will improve current protocols such as Oauth2, GDOI and GNAP.\",\"PeriodicalId\":356322,\"journal\":{\"name\":\"Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3485730.3492901\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3485730.3492901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Decentralised and Scalable Security for IoT Devices
Advancements in IoT technology has provided great benefits, unfortunately, IoT adoption also causes an increase in the attack surface which intensify security risks. As a consequence, different types of IoT smart devices have become the main targets of many high-profile cyber-attacks. To safeguard against threats such as introduction of fake IoT nodes and identity theft, the IoT needs scalable and resilient device authentication management. Contrary to existing mechanisms for IoT device authentication which are unsuitable for huge number of devices, my research focuses on decentralised and distributed security mechanisms that will improve current protocols such as Oauth2, GDOI and GNAP.