{"title":"物联网解决方案的网络安全分层管理方法","authors":"Erdal Ozdoğan, Resul Das","doi":"10.1504/ijguc.2023.133442","DOIUrl":null,"url":null,"abstract":"The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.5000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Layered management approach to cyber security of IoT solutions\",\"authors\":\"Erdal Ozdoğan, Resul Das\",\"doi\":\"10.1504/ijguc.2023.133442\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.\",\"PeriodicalId\":44878,\"journal\":{\"name\":\"International Journal of Grid and Utility Computing\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Utility Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijguc.2023.133442\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Utility Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijguc.2023.133442","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Layered management approach to cyber security of IoT solutions
The Internet of Things consists of devices, each with its own vulnerabilities and interconnected by various technologies. This broad spectrum, a combination of old and new technologies, shows that there are many aspects to consider in ensuring IoT security. Besides the vulnerabilities inherited from pre-IoT technologies, there are a wide variety of IoT-specific vulnerabilities. The existence of large attack surfaces for cyber threat actors exposes IoT to a variety of attacks, from simple to complex. Developing defence strategies against this wide range of attacks is possible with a systematic approach. In this study, threats to IoT are examined from the perspective of IoT layered architecture, and an IoT Security Management Model is proposed as a comprehensive solution strategy. Also, based on the developed model, countermeasures related to IoT security have been proposed.