物联网环境下各种攻击的最新进展及应对措施

S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar
{"title":"物联网环境下各种攻击的最新进展及应对措施","authors":"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar","doi":"10.1109/ICSPC46172.2019.8976527","DOIUrl":null,"url":null,"abstract":"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Recent Advances and Countermeasures Against Various Attacks in IoT Environment\",\"authors\":\"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar\",\"doi\":\"10.1109/ICSPC46172.2019.8976527\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.\",\"PeriodicalId\":321652,\"journal\":{\"name\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSPC46172.2019.8976527\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976527","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

在过去的十年里,互联网技术经历了飞速的发展,尤其是物联网(IoT)。目前的进步已经改变了人们的生活方式,智能设备能够随时随地与任何人联系。与传统互联网不同,物联网通过各种有线和无线网络将大型机器、人类、资源紧张的小工具/设备和传感器连接在一起。在本文中,我们对物联网的安全性进行了调查,并分析了最近与之相关的主要问题。本文探讨了物联网的安全目标,并在分层的基础上对攻击进行了分类和校正。其主要目的是找出物联网如何、何时以及为何受到攻击或参与攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Recent Advances and Countermeasures Against Various Attacks in IoT Environment
Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信