A roadmap for security challenges in the Internet of Things

被引:0
|
作者
Arbia Riahi Sfar [1 ,2 ]
Enrico Natalizio [2 ]
Yacine Challal [3 ]
Zied Chtourou [1 ]
机构
[1] VRIT Lab-Military Academy
[2] Sorbonne Universites, Universite de technologie de Compiegne, CNRS
[3] Laboratoire de Methodes de Conception de Systemes (LMCS), Ecole Nationale Superieure d'Informatique (ESI), Centre de Recherche sur l'Information Scientifique et Technique
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Unquestionably, communicating entities(object, or things) in the Internet of Things(IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA(Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications.
引用
收藏
页码:118 / 137
页数:20
相关论文
共 50 条
  • [1] A roadmap for security challenges in the Internet of Things
    Sfar, Arbia Riahi
    Natalizio, Enrico
    Challal, Yacine
    Chtourou, Zied
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) : 118 - 137
  • [2] Security challenges of the Internet of Things
    Weber, Mario
    Boban, Marija
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 638 - 643
  • [3] Challenges In Security In Internet Of Things
    Florea, Julia
    Ruse, Laura Cristina
    Rughinis, Razvan
    [J]. 2017 16TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2017,
  • [4] The Internet of Things: Security Challenges
    van Oorschot, Paul C.
    Smith, Sean W.
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (05) : 7 - 9
  • [5] Security challenges in the internet of things
    Chasaki, Danai
    Mansour, Christopher
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (03) : 141 - 149
  • [6] Internet of Things - A Study on the Security Challenges
    Billure, Rajendra
    Tayur, Varun M.
    Mahesh, V
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 247 - 252
  • [7] Security in Internet of Things: Opportunities and Challenges
    Sha, Kewei
    Wei, Wei
    Yang, Andrew T.
    Shi, Weisong
    [J]. 2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 512 - 518
  • [8] Internet of Things Security: Challenges and Perspectives
    Harit, Amina
    Ezzati, Abdellah
    Elharti, Rachid
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [9] Security of the Internet of Things: perspectives and challenges
    Jing, Qi
    Vasilakos, Athanasios V.
    Wan, Jiafu
    Lu, Jingwei
    Qiu, Dechao
    [J]. WIRELESS NETWORKS, 2014, 20 (08) : 2481 - 2501
  • [10] Internet of Things: Security Vulnerabilities and Challenges
    Andrea, Ioannis
    Chrysostomou, Chrysostomos
    Hadjichristofi, George
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 180 - 187