物联网中安全组件布局优化调查

IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri
{"title":"物联网中安全组件布局优化调查","authors":"Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri","doi":"10.1007/s10922-024-09852-6","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"5 1","pages":""},"PeriodicalIF":4.1000,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey on the Optimization of Security Components Placement in Internet of Things\",\"authors\":\"Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri\",\"doi\":\"10.1007/s10922-024-09852-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.</p>\",\"PeriodicalId\":50119,\"journal\":{\"name\":\"Journal of Network and Systems Management\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2024-08-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Network and Systems Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s10922-024-09852-6\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Systems Management","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10922-024-09852-6","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)环境已成为传播分布式拒绝服务(DDoS)和恶意软件入侵的基本渠道。物联网中的网络威胁需要新的机制和策略来确保设备在生命周期内的安全。对于联网设备的运营商和制造商来说,这些威胁是真实存在的。安全设备较少和未修正的设备是僵尸网络运营商捕获和获取测试设备的优先目标。在本文中,我们回顾了在物联网中优化安全组件放置的问题。我们对物联网中不同级别安全组件的放置提供了一个通用视图。首先,我们概述了物联网。然后,我们对物联网中安全组件放置的众多解决方案进行了演示和专题分类。因此,在介绍之后,我们将讨论各种研究问题,并就该领域的各种未来发展方向提出一系列建议,以推进本研究文章中问题的解决。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

A Survey on the Optimization of Security Components Placement in Internet of Things

A Survey on the Optimization of Security Components Placement in Internet of Things

The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.60
自引率
16.70%
发文量
65
审稿时长
>12 weeks
期刊介绍: Journal of Network and Systems Management, features peer-reviewed original research, as well as case studies in the fields of network and system management. The journal regularly disseminates significant new information on both the telecommunications and computing aspects of these fields, as well as their evolution and emerging integration. This outstanding quarterly covers architecture, analysis, design, software, standards, and migration issues related to the operation, management, and control of distributed systems and communication networks for voice, data, video, and networked computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信