检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:袁斌 万俊 吴宇晗 邹德清 金海 Bin Yuan;Jun Wan;Yu-Han Wu;De-Qing Zou;Hai Jin(School of Cyber Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China;Hubei Key Laboratory of Distributed System Security,Huazhong University of Science and Technology Wuhan 430074,China;Hubei Engineering Research Center on Big Data Security,Huazhong University of Science and Technology Wuhan 430074,China;National Engineering Research Center for Big Data Technology and System,Huazhong University of Science and Technology,Wuhan 430074,China;Services Computing Technology and System Lab,Huazhong University of Science and Technology,Wuhan 430074,China;Shenzhen Huazhong University of Science and Technology Research Institute,Shenzhen 518057,China;School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China;Cluster and Grid Computing Lab,Huazhong University of Science and Technology,Wuhan 430074,China)
机构地区:[1]School of Cyber Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China [2]Hubei Key Laboratory of Distributed System Security,Huazhong University of Science and Technology Wuhan 430074,China [3]Hubei Engineering Research Center on Big Data Security,Huazhong University of Science and Technology Wuhan 430074,China [4]National Engineering Research Center for Big Data Technology and System,Huazhong University of Science and Technology,Wuhan 430074,China [5]Services Computing Technology and System Lab,Huazhong University of Science and Technology,Wuhan 430074,China [6]Shenzhen Huazhong University of Science and Technology Research Institute,Shenzhen 518057,China [7]School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China [8]Cluster and Grid Computing Lab,Huazhong University of Science and Technology,Wuhan 430074,China
出 处:《Journal of Computer Science & Technology》2023年第2期228-247,共20页计算机科学技术学报(英文版)
基 金:supported by the Hubei Provincial Key Research and Development Technology Special Innovation Project under Grant No.2021BAA032;the Wuhan Applied Foundational Frontier Project under Grant No.2020010601012188;the Guangdong Provincial Key Research and Development Plan Project of China under Grant No.2019B010139001.
摘 要:Among the plethora of IoT(Internet of Things)applications,the smart home is one of the fastest-growing.However,the rapid development of the smart home has also made smart home systems a target for attackers.Recently,researchers have made many efforts to investigate and enhance the security of smart home systems.Toward a more secure smart home ecosystem,we present a detailed literature review on the security of smart home systems.Specifically,we categorize smart home systems’security issues into the platform,device,and communication issues.After exploring the research and specific issues in each of these security areas,we summarize the root causes of the security flaws in today's smart home systems,which include the heterogeneity of internal components of the systems,vendors'customization,the lack of clear responsibility boundaries and the absence of standard security standards.Finally,to better understand the security of smart home systems and potentially provide better protection for smart home systems,we propose research directions,including automated vulnerability mining,vigorous security checking,and data-driven security analysis.
关 键 词:IoT(Internet of Things) smart home IoT security smart home security
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.31