Mohammed A. M.Sadeeq, Subhi R. M. Zeebaree, R. Qashi, S. H. Ahmed, Karwan Jacksi
{"title":"物联网安全:调查","authors":"Mohammed A. M.Sadeeq, Subhi R. M. Zeebaree, R. Qashi, S. H. Ahmed, Karwan Jacksi","doi":"10.1109/ICOASE.2018.8548785","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a central database through a channel. Keeping this generated data and its transformation is one of the biggest challenges in IoT today and it is one of the biggest concerns of all organizations that they use the IoT technology. In this paper, the most crucial researches related to security in the IoT field have been reviewed and discussed while taking account of the great power of the Quantum Computers. Significant attributes of these studies are compared. IoT security ranges from the software layer security, board and chip, vulnerable cryptography algorithm, protocol and network security, social engineering, malware like (viruses, ransomware, trojan horses). Due to a variety of IoT devices and the rapid emergence of new devices, it is difficult to measure the security of IoT systems and identify risks and vulnerabilities.","PeriodicalId":144020,"journal":{"name":"2018 International Conference on Advanced Science and Engineering (ICOASE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Internet of Things Security: A Survey\",\"authors\":\"Mohammed A. M.Sadeeq, Subhi R. M. Zeebaree, R. Qashi, S. H. Ahmed, Karwan Jacksi\",\"doi\":\"10.1109/ICOASE.2018.8548785\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a central database through a channel. Keeping this generated data and its transformation is one of the biggest challenges in IoT today and it is one of the biggest concerns of all organizations that they use the IoT technology. In this paper, the most crucial researches related to security in the IoT field have been reviewed and discussed while taking account of the great power of the Quantum Computers. Significant attributes of these studies are compared. IoT security ranges from the software layer security, board and chip, vulnerable cryptography algorithm, protocol and network security, social engineering, malware like (viruses, ransomware, trojan horses). Due to a variety of IoT devices and the rapid emergence of new devices, it is difficult to measure the security of IoT systems and identify risks and vulnerabilities.\",\"PeriodicalId\":144020,\"journal\":{\"name\":\"2018 International Conference on Advanced Science and Engineering (ICOASE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Advanced Science and Engineering (ICOASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOASE.2018.8548785\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Science and Engineering (ICOASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOASE.2018.8548785","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a central database through a channel. Keeping this generated data and its transformation is one of the biggest challenges in IoT today and it is one of the biggest concerns of all organizations that they use the IoT technology. In this paper, the most crucial researches related to security in the IoT field have been reviewed and discussed while taking account of the great power of the Quantum Computers. Significant attributes of these studies are compared. IoT security ranges from the software layer security, board and chip, vulnerable cryptography algorithm, protocol and network security, social engineering, malware like (viruses, ransomware, trojan horses). Due to a variety of IoT devices and the rapid emergence of new devices, it is difficult to measure the security of IoT systems and identify risks and vulnerabilities.