Security of the Internet of Things: perspectives and challenges

被引:726
作者
Jing, Qi [1 ,2 ,3 ]
Vasilakos, Athanasios V. [4 ]
Wan, Jiafu [5 ]
Lu, Jingwei [1 ]
Qiu, Dechao [1 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Lab Informat Secur, Beijing, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing, Peoples R China
[4] Kuwait Univ, Dept Comp Sci, Kuwait, Kuwait
[5] S China Univ Technol, Sch Mech & Automot Engn, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Internet of Things; Security; Heterogeneous; Wireless sensor networks; RFID sensor networks; WIRELESS SENSOR NETWORKS; CYBER-PHYSICAL SYSTEMS; ROUTING PROTOCOL; TAXONOMY; PRIVACY; SCHEME;
D O I
10.1007/s11276-014-0761-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.
引用
收藏
页码:2481 / 2501
页数:21
相关论文
共 115 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   A delay-tolerant framework for integrated RSNs in IoT [J].
Al-Turjman, Fadi M. ;
Al-Fagih, Ashraf E. ;
Alsalih, Waleed M. ;
Hassanein, Hossam S. .
COMPUTER COMMUNICATIONS, 2013, 36 (09) :998-1010
[3]  
[Anonymous], 2004, INPROCEEDINGS ACM
[4]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[5]  
[Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
[6]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[7]  
Anti-Phishing Working Group, 2009, Q42 ANT WORK GROUP
[8]   DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks [J].
Avudainayagam, A ;
Lou, WJ ;
Fang, YG .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (02) :228-236
[9]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[10]  
Bao Y. Q., 2013, INTERNET THINGS TECH, V7, P38