Warianty tytułu
Security in the Internet of Things
Języki publikacji
Abstrakty
W referacie przedstawiono oczekiwane korzyści płynące z zastosowania Internetu Rzeczy oraz zidentyfikowano potencjalne zagrożenia wynikające z wykorzystania tej techniki. Dokonana konfrontacja korzyści z zagrożeniami ma pozwolić na ocenę perspektyw rozwoju tej techniki oraz umożliwić wskazanie najbardziej obiecujących mechanizmów służących ograniczeniu skutków zagrożeń. Artykuł wskazuje, że zwiększenie poziomu bezpieczeństwa może nastąpić nie tylko w wyniku zastosowania tradycyjnych metod kryptograficznych, ale przede wszystkim poprzez wykorzystanie modeli zarządzania zaufaniem.
Expected benefits of the Internet of Things as well as potential threats of this technology can be found in the article. Advantages and threats of the Internet of Things were confronted to enable an assessment of perspectives of this technology and to point out the most promising mechanisms to reduce adverse consequences. The article is concluded with the statement that the security of the Internet of Things can be improved not only by using traditional cryptographic methods but above all by trust management models.
Rocznik
Tom
Strony
121--137
Opis fizyczny
Bibliogr. 57 poz.
Twórcy
autor
- Politechnika Warszawska, Wydział Elektroniki i Technik Informacyjnych
Bibliografia
- [1] M. Janiszewski, „Bezpieczeństwo w Internecie Rzeczy”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 8-9/2013, str. 727-734, 2013
- [2] R. Van Kranenburg, E. Anzelmo, A. Bassi, D. Caprio, S. Dodson, M. Ratto, “The internet of things. A critique of ambient technology and the all-seeing network of RFID”, Network Notebooks, 2008
- [3] A. Stabryła, S. Wawak (praca zbiorowa), „Metody badania i modele rozwoju organizacji”, 2012; S. Dyrda, L. Wisłowski, J. Zawiła-Niedźwiecki, Rozdział 8. „Teleinformatyczne technologie przyszłości w zarządzaniu”, str. 93-108
- [4] S. Haller, S. Karnouskos, C. Schroth, “The Internet of Things in an Enterprise Context” Future Internet Symposium (FIS2008), str. 14-28, 2008
- [5] M. Janiszewski, „Internet Rzeczy a działalność przedsiębiorstw – korzyści, szanse i zagrożenia”, praca dyplomowa magisterska, 2013
- [6] D. Jain, P. V. Krishna, V. Saritha, “A Study on Internet of Things based Applications”, CoRR, 2012
- [7] J. K. W. Won, H. Li, S. W. Wang, “Intelligent building research: a review”, Automation in Construction, vol. 14, str. 143-159, 2005
- [8] E. Niezabitowska, Budynek inteligentny - Potrzeby użytkownika a standard budynku inteligentnego, Tom I i II, Wyd. Politechniki Śląskiej, Gliwice 2005
- [9] D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, “Internet of things: Vision, applications and research challenges”, Ad Hoc Networks, vol. 10, str. 1497-1516, 2012
- [10] J. Liu, L. Yang, “Application of Internet of Things in the Community Security Management”, Computational Intelligence, Communication Systems and Networks (CICSyN), 2011 Third International Conference on, str. .314-318, 2011
- [11] L. Zheng, S. Chen, S. Xiang, Y. Hu, “Research of Architecture and Application of Internet of Things for Smart Grid” Computer Science & Service System (CSSS), 2012 International Conference on, str. 938,941, 2012
- [12] Y. Wang, H. Qi, “Research of Intelligent Transportation System Based on the Internet of Things Frame”, Wireless Engineering and Technology, vol. 3, str. 160-166, 2012
- [13] L. Xiao, Z. xia Wang, “Internet of Things: a New Application for Intelligent Traffic Monitoring System”, Journal of Networks, vol. 6, str. 887-894, 2011
- [14] H. Xiang, W. Ji, “Research of Early Warning Mechanism for Traffic Safety Based on Internet of Things“, Advances in Information Sciences and Service Sciences, vol. 4, str. 131-138, 2012
- [15] D. Bandyopadhyay, J. Sen, “Internet of Things - Applications and Challenges in Technology and Standardization”, Wireless Personal Communications, vol. 58, str. 49-69, 2011
- [16] D. Jin, “Application of Internet of Things in Electronic Commerce”, International Journal of Digital Content Technology & its Applic, vol. 6, str. 222-225, 2012
- [17] Z. Ye, Z. Feng, Y. Fei, “The Design of Wireless Sensor Application System Based on Internet of Things”, Sensors & Transducers, vol. 16, str. 18-26, 2012
- [18] D. Tektonidis, A. Koumpis, “Accessible Internet-of-Things and Internet-of-Content Services for All in the Home or on the Move”, International Journal of Interactive Mobile Technologies, vol. 6, str. 25-33, 2012
- [19] M. C. Domingo, “An overview of the Internet of Things for people with disabilities”, Journal of Network and Computer Applications vol. 35, str. 584–596, 2012
- [20] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A Survey”, Computer Networks, vol. 54, str. 2787-2805, 2010
- [21] G. Gang, L. Zeyong, J. Jun, “Internet of Things Security Analysis”, Internet Technology and Applications (iTAP), 2011 International Conference on, str. 1,4,16-18, 2011
- [22] R. H. Weber, “Internet of Things – New security and privacy challenges”, Computer Law & Security Review, vol. 26 str. 23–30, 2010
- [23] Louis Coetzee, Johan Eksteen, “The Internet of Things – Promise for the Future? An Introduction”, IST-Africa 2011 Conference Proceedings, str. 1-9, 2011
- [24] L. Li, “Study on Security Architecture in the Internet of Things”, 2012 International Conference on Measurement, Information and Control (MIC), str. 374-377, 2012
- [25] T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, K. Wehrle, “Security Challenges in the IP-based Internet of Things”, Wireless Personal Communications, str. 527– 542, 2011
- [26] R. Hummen, T. Heer, K. Wehrle, “A Security Protocol Adaptation Layer for the IP-based Internet of Things”, Interconnecting Smart Objects with the Internet Workshop, 2011
- [27] T. Polk, S. Turner, “Security Challenges For the Internet Of Things”, Interconnecting Smart Objects with the Internet Workshop, 2011
- [28] R. Roman, P. Najera, J. Lopez, “Securing the Internet of Things”, IEEE Computer, ,str. 51-58, 2011
- [29] M. Katagi, S. Moriai, “Lightweight Cryptography for the Internet of Things”, Interconnecting Smart Objects with the Internet Workshop, 2011
- [30] A. Ukil, J. Sen, S. Koilakonda, “Embedded Security for Internet of Things”, Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, str. 1-6, 2011
- [31] D. Kozlov, J. Veijalainen, Y. Ali, “Security and Privacy Threats in IoT Architectures”, Proceedings of the 7th International Conference on Body Area Networks, str. 256-262, 2012
- [32] L. Atzori, A. Iera, G. Morabito, M. Nitti, “The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization”, Computer Networks, str. 3594–3608, 2012
- [33] D. Chen, G. Chang, D. Sun, J. Li, J. Jia, X. Wang, “TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things”, Comput. Sci. Inf. Syst., str. 1207-1228, 2011
- [34] P. Doody, A. Shields, “Mining Network Relationships in the Internet of Things”, Proceedings of the 2012 international workshop on Self-aware internet of things, str. 7-12, 2012
- [35] X. Li, Z. Xuan, L. Wen, “Research on the Architecture of Trusted Security System Based on the Internet of Things”, 2011 Fourth International Conference on Intelligent Computation Technology and Automation, str. 1172-1175, 2011
- [36] J. An, X. Gui, W. Zhang, J. Jiang, J. Yang, “Research on social relations cognitive model of mobile nodes in Internet of Things”, Journal of Network and Computer Applications, str. 799– 810, 2013
- [37] M. Zhang, R. Zheng, Q. Wu, W. Wei, “A Novel Multi-x Cooperative Decision-makin Mechanism for Cognitive Internet of Things”, Journal of Networks, str. 2104-2111, 2012
- [38] C. Chen, S. Helal, “A Device-Centric Approach to a Safer Internet of Things”, Proceedings of the 2011 international workshop on Networking and object memories for the internet of things, str. 1-6, 2011
- [39] F. Bao, I. Chen, “Dynamic Trust Management for Internet of Things Applications”, Proceedings of the 2012 international workshop on Self-aware internet of things, str. 1-6, 2012
- [40] G. M. Køien, “Reflections on Trust devices – An Informal Survey of Human Trust in an Internet-of-Things Context”, Wireless Personal Communications, str. 495–510, 2011
- [41] O. Gaddour, A. Koubâa, “RPL in a nutshell: A survey”, Computer Networks, vol. 56, str. 3163-3178, 2012
- [42] A. Srinivasany, J. Teitelbaumy, H. Liangz, J. Wuy, M Cardei, “Reputation and Trust-based Systems for Ad Hoc and Sensor Networks”, W: A. Boukerche (red.), Algorithms and Protocols
- [43] K. Hoffman, D. Zage, C. Nita-Rotaru, “A Survey of Attack and Defense Techniques for Reputation Systems”, ACM Computing Surveys, vol. 42, str. 1-31, 2009
- [44] P. Trakadas, S. Maniatis, P. Karkazis, T. Zahariadis, H.C. Leligou, S. Voliotis, “A novel flexible trust management system for heterogeneous wireless sensor networks”, International Symposium on Autonomous Decentralized Systems, str. 1-6, 2009
- [45] Y. Sun, Z. Han, K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networks”, IEEE Communications Magazine, vol.46, str.112-119, 2008
- [46] H. Abie, I. Balasingham, “Risk-Based Adaptive Security for Smart IoT in eHealth”, Proceedings of the 7th International Conference on Body Area Networks, str. 269-275, 2012
- [47] A. Yazidi, O. Granmo, B. J. Oommen, M. Gerdes, F. Reichert, “A User-centric Approach for Personalized Service Provisioning in Pervasive Environments”, Wireless Personal Communications, str. 543-566, 2011
- [48] B. Zhang, X. Ma, Z. Qin, “Security Architecture on the Trusting Internet of Things”, Journal of Electronic Science and Technology, str. 364-367, 2011
- [49] I. Gudymenko, K. Borcea-Pfitzmann, K. Tietze, “Privacy Implications of the Internet of Things”, Constructing Ambient Intelligence Communications in Computer and Information Science, str. 280-286, 2012
- [50] L. Tan, N. Wang, “Future Internet: The Internet of Things”, 2010 3rd International Conference on Advanced Computer Theory and Engineering, str. 376-380, 2010
- [51] I. Gudymenko, K. Borcea-Ptzmann, “A Framework for Transforming Abstract Privacy Models into Implementable System Requirements”, 1st International Workshop on Model-based Interactive Ubiquitous Systems, 2011
- [52] A. C. Sarma, J. Girão, “Identities in the Future Internet of Things”, Wireless Personal Communications str. 353–363, 2009
- [53] R. H. Weber, “Internet of things – Need for a new legal environment?”, Computer Law & Security Review, str. 522–527, 2009
- [54] G. Santucci, “RFID and the Internet of Things, Speeches and Documents for the Record”, 2012
- [55] Komisja Europejska, “Internet of Things – An action plan for Europe”, 2009
- [56] Komisja Europejska, “Appendix F: The Internet of Things (Background)”, 2009
- [57] H. Suo, J. Wan, C. Zou, J. Liu, “Security in the Internet of Things: A Review”, 2012
- International Conference on Computer Science and Electronics Engineering, str. 648-
- 651, 2012
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-8f446a3f-8a70-4b62-8b2a-eac9b3ec23c4