基于物联网监控系统的安全可靠的设备访问控制方案

Divya Paikaray, Jayneel Gandhi
{"title":"基于物联网监控系统的安全可靠的设备访问控制方案","authors":"Divya Paikaray, Jayneel Gandhi","doi":"10.1109/IC3I56241.2022.10072568","DOIUrl":null,"url":null,"abstract":"Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems\",\"authors\":\"Divya Paikaray, Jayneel Gandhi\",\"doi\":\"10.1109/IC3I56241.2022.10072568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

目前,工程、医药、交通、农业等几乎所有行业都在密切关注基于物联网的监控系统。为了提高受监视系统的安全性,我们加入了监控系统。因此,确保系统的高可靠性至关重要。以下子系统-传感器,转换器,微控制器,执行器,通信框架和相关设备,它们完美地配合物联网监控系统的功能。作者的目标是强调这些系统提供的许多可靠性问题和困难。此外,它被扩展为描述基于功能职责的子组件可靠性。攻击者可以通过监听通信信道和利用公共参数来模仿任何小工具。还可以通过公共通道使用社区参数和对话来执行成功的中间人攻击。论文接着推荐了一种名为iLACKA-IoT的增强协议。证据是通过使用随机或真实(ROR)模型的正式验证和使用攻击弹性的非正式验证给出的。iLACKA-IoT可抵抗一系列威胁和必要的安全程度。与LACKA-IoT和类似系统相比,iLACKA-IoT提供了更高的性能效率和更高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems
Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信