物联网解决方案的网络安全分层管理方法

IF 0.5 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
Erdal Ozdoğan, Resul Das
{"title":"物联网解决方案的网络安全分层管理方法","authors":"Erdal Ozdoğan, Resul Das","doi":"10.1504/ijguc.2023.133442","DOIUrl":null,"url":null,"abstract":"The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.5000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Layered management approach to cyber security of IoT solutions\",\"authors\":\"Erdal Ozdoğan, Resul Das\",\"doi\":\"10.1504/ijguc.2023.133442\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.\",\"PeriodicalId\":44878,\"journal\":{\"name\":\"International Journal of Grid and Utility Computing\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Utility Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijguc.2023.133442\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Utility Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijguc.2023.133442","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

物联网由设备组成,每个设备都有自己的漏洞,并通过各种技术相互连接。这种广泛的范围,新旧技术的结合,表明在确保物联网安全方面需要考虑许多方面。除了从前物联网技术继承的漏洞之外,还有各种各样的物联网特定漏洞。网络威胁参与者的大型攻击面使物联网面临从简单到复杂的各种攻击。通过系统的方法,制定针对这种广泛攻击的防御策略是可能的。本研究从物联网分层架构的角度分析了物联网面临的威胁,并提出了物联网安全管理模型作为综合解决策略。此外,根据开发的模型,提出了与物联网安全相关的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Layered management approach to cyber security of IoT solutions
The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Grid and Utility Computing
International Journal of Grid and Utility Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
1.30
自引率
0.00%
发文量
79
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信