传感器网络中的安全问题和网络取证中可采证据的收集

J. Nehinbe, Peter Damuut
{"title":"传感器网络中的安全问题和网络取证中可采证据的收集","authors":"J. Nehinbe, Peter Damuut","doi":"10.1109/EMS.2011.95","DOIUrl":null,"url":null,"abstract":"The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.","PeriodicalId":131364,"journal":{"name":"2011 UKSim 5th European Symposium on Computer Modeling and Simulation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security issues in Sensor Networks and gathering admissible evidence in Network Forensics\",\"authors\":\"J. Nehinbe, Peter Damuut\",\"doi\":\"10.1109/EMS.2011.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.\",\"PeriodicalId\":131364,\"journal\":{\"name\":\"2011 UKSim 5th European Symposium on Computer Modeling and Simulation\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 UKSim 5th European Symposium on Computer Modeling and Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMS.2011.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 UKSim 5th European Symposium on Computer Modeling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMS.2011.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

信息安全的范围日益扩大,由于新的和新兴的维度在计算机应用的演变,意图减少人工操作。这些都需要制造便携式和智能设备,这些设备可以连接到互联网,用于家庭和工业用途以及环境监测。因此,旨在处理通过计算机和传感器网络进行的非法活动的全球和国家监管法律和法规也在增加。然而,一些使用这些技术的人通过泄露信息、伪装、电话窃听和密码破解等方式滥用这些技术的案件不断发生。因此,本文批判性地描述和分析了与计算机系统接口的智能设备调查中出现的安全挑战。对于研究人员、供应商、安全专业人员和一般的IT最终用户来说,该审查将在功能上非常有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security issues in Sensor Networks and gathering admissible evidence in Network Forensics
The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信