检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Tinshu Sasi Arash Habibi Lashkari Rongxing Lu Pulei Xiong Shahrear Iqbal
机构地区:[1]Canadian Institute for Cybersecurity(CIC),Faculty of Computer Science,University of New Brunswick(UNB),Fredericton E3B 5A3,Canada [2]Behaviour-Centric Cybersecurity Center(BCCC),School of Information Technology,York University,Toronto M3J 1P3,Canada [3]National Research Council,Ottawa K1A OR6,Canada
出 处:《Journal of Information and Intelligence》2024年第6期455-513,共59页信息与智能学报(英文)
基 金:supported in part by collaborative research funding from the National Research Council of Canada's Artificial Ir elligence for Logistics Program.
摘 要:The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter.
关 键 词:Internet of Things IoTattacks TAXONOMY VULNERABILITIES Detectionmethods CHALLENGES
分 类 号:TP391.44[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7