Survey of Internet of Things Security

被引:0
|
作者
Zhang Y. [1 ]
Zhou W. [1 ]
Peng A. [1 ]
机构
[1] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
来源
| 1600年 / Science Press卷 / 54期
基金
中国国家自然科学基金;
关键词
Challenge; Intelligent; Internet of things; Privacy; Security; Survey;
D O I
10.7544/issn1000-1239.2017.20170470
中图分类号
学科分类号
摘要
With the development of smart home, intelligent care and smart car, the application fields of IoT are becoming more and more widespread, and its security and privacy receive more attention by researchers. Currently, the related research on the security of the IoT is still in its initial stage, and most of the research results cannot solve the major security problem in the development of the IoT well. In this paper, we firstly introduce the three-layer logic architecture of the IoT, and outline the security problems and research priorities of each level. Then we discuss the security issues such as privacy preserving and intrusion detection, which need special attention in the IoT main application scenarios (smart home, intelligent healthcare, car networking, smart grid, and other industrial infrastructure). Though synthesizing and analyzing the deficiency of existing research and the causes of security problem, we point out five major technical challenges in IoT security. They are privacy protection in data sharing, the equipment security protection under limited resources, more effective intrusion detection and defense systems and method, access control of equipment automation operations and cross-domain authentication of motive device. We finally detail every technical challenge and point out the IoT security research hotspots in future. © 2017, Science Press. All right reserved.
引用
收藏
页码:2130 / 2143
页数:13
相关论文
共 110 条
  • [1] Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)
  • [2] Internet of Things Market Statistics-2016
  • [3] Hacking the Human Heart
  • [4] Langner R., Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy, 9, 3, pp. 49-51, (2011)
  • [5] 2016 dyn cyberattack
  • [6] Patterson R., How safe is your data with the IoT and smart devices
  • [7] Wright A., Mapping the Internet of Things, (2016)
  • [8] IoT devices have a large number of low-level loopholes
  • [9] Roman R., Zhou J., Lopez J., On the features and challenges of security and privacy in distributed Internet of things, Computer Networks, 57, 10, pp. 2266-2279, (2013)
  • [10] Fu K., Kohno T., Lopresti D., Et al., security and privacy threats posed by accelerating trends in the Internet of things