物联网(IoT):应用系统和安全漏洞

Jinesh Ahamed, Amala V. Rajan
{"title":"物联网(IoT):应用系统和安全漏洞","authors":"Jinesh Ahamed, Amala V. Rajan","doi":"10.1109/ICEDSA.2016.7818534","DOIUrl":null,"url":null,"abstract":"IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.","PeriodicalId":247318,"journal":{"name":"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Internet of Things (IoT): Application systems and security vulnerabilities\",\"authors\":\"Jinesh Ahamed, Amala V. Rajan\",\"doi\":\"10.1109/ICEDSA.2016.7818534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.\",\"PeriodicalId\":247318,\"journal\":{\"name\":\"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEDSA.2016.7818534\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEDSA.2016.7818534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 36

摘要

物联网(Internet of Things, IoT)是将物体嵌入传感器技术,通过无线通信媒介相互交互,产生、交换和传输数据,而无需人工交互的系统。它提供了物理世界和网络世界之间的相互作用,被称为网络物理系统。物联网可以实现为智慧城市,智能家居,交通管理系统等。研究表明,任何具有远程管理、动态拓扑、资源约束和无线通信介质等特点的系统都容易出现安全问题。本研究旨在调查和确定适合阿联酋的特定类型的物联网应用,分析与之相关的潜在安全威胁及其对这些应用的影响。对现有文献进行了彻底的探索和审查,以确定物联网应用系统和相关的网络漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Internet of Things (IoT): Application systems and security vulnerabilities
IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over wireless communication medium to generate, exchange and transfer data without human interaction. It provides interaction between physical world and cyber world which is known as cyber physical systems. IoT can be implemented as smart cities, smart homes, traffic management systems etc. Research has proven that, any system with the characteristics of remote management, dynamic topology, resource constraints and wireless communication medium are always susceptible to security issues. This research aims to investigate and identify the specific types of IoT applications suitable for UAE, analyse the potential security threats associated them and their impacts on these applications. A thorough exploration and review of the available literature has been done to identify the IoT application systems and related cyber vulnerabilities.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信