物联网(IoT)嵌入式安全框架

S. Babar, Antonietta Stango, N. Prasad, Jaydip Sen, R. Prasad
{"title":"物联网(IoT)嵌入式安全框架","authors":"S. Babar, Antonietta Stango, N. Prasad, Jaydip Sen, R. Prasad","doi":"10.1109/WIRELESSVITAE.2011.5940923","DOIUrl":null,"url":null,"abstract":"IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"266","resultStr":"{\"title\":\"Proposed embedded security framework for Internet of Things (IoT)\",\"authors\":\"S. Babar, Antonietta Stango, N. Prasad, Jaydip Sen, R. Prasad\",\"doi\":\"10.1109/WIRELESSVITAE.2011.5940923\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.\",\"PeriodicalId\":68078,\"journal\":{\"name\":\"无线互联科技\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"266\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"无线互联科技\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/WIRELESSVITAE.2011.5940923\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"无线互联科技","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 266

摘要

通过扩展随时随地的通信和网络,物联网将成为生活的一部分。物联网的安全需求肯定会强调在其整个生命周期中正确制定、实施和执行安全策略的重要性。本文对嵌入式安全,特别是物联网领域的嵌入式安全进行了详细的调查和分析。与传统的安全解决方案一起,本文强调了在设备本身提供内置安全性的必要性,以提供灵活的基础设施,用于动态预防、检测、诊断、隔离和针对成功入侵的对策。在此调查和分析的基础上,本文根据设备的计算时间、能耗和内存要求来定义安全需求。最后,本文提出了一个嵌入式安全框架,作为软硬件协同设计方法的一个特点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proposed embedded security framework for Internet of Things (IoT)
IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
19945
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信