Evolution and Trends in IoT Security

被引:37
作者
Roman-Castro, Rodrigo [1 ]
Lopez, Javier [2 ]
Gritzalis, Stefanos [3 ]
机构
[1] Univ Malaga, Comp Sci, Malaga, Spain
[2] Univ Malaga, Network Informat & Comp Secur Lab NICS, Malaga, Spain
[3] Univ Aegean, Lab Informat & Commun Syst Secur Info Sec Lab, Mitilini, Greece
关键词
INTERNET; THINGS; CHALLENGES; OPPORTUNITIES; PRIVACY;
D O I
10.1109/MC.2018.3011051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The amount and diversity of devices that integrate connection capabilities continues to grow, and both the public and private sectors continue to explore various application areas and paradigms that involve these connected objects. Yet as the IoT field evolves, so too must its security capabilities. This article presents an analysis of IoT security issues and an overview of the current and future trends in this area.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 18 条
[1]   Trust Management in Social Internet of Things: A Survey [J].
Abdelghani, Wafa ;
Zayani, Corinne Amel ;
Amous, Ikram ;
Sedes, Florence .
SOCIAL MEDIA: THE GOOD, THE BAD, AND THE UGLY, 2016, 9844 :430-441
[2]   INVITED Things, Trouble, Trust: On Building Trust in IoT Systems [J].
Abera, Tigist ;
Asokan, N. ;
Davi, Lucas ;
Koushanfar, Farinaz ;
Paverd, Andrew ;
Sadeghi, Ahmad-Reza ;
Tsudik, Gene .
2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
[3]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546
[4]  
Ferreira J. E., 2018, SECURITY COMMUNICATI, V2018
[5]  
Hypponen M, 2017, TECHNOL INNOV MANAG, V7, P5
[6]   Identity in the Internet-of-Things (IoT): New Challenges and Opportunities [J].
Lam, Kwok-Yan ;
Chi, Chi-Hung .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 :18-26
[7]   INTERNET OF THINGS STANDARDS: WHO STANDS OUT FROM THE CROWD? [J].
Meddeb, Aref .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 :40-47
[8]   PUFs as Promising Tools for Security in Internet of Things [J].
Mukhopadhyay, Debdeep .
IEEE DESIGN & TEST, 2016, 33 (03) :103-115
[9]   The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices [J].
Perrone, Giovanni ;
Vecchio, Massimo ;
Pecori, Riccardo ;
Giaffreda, Raffaele .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :246-253
[10]   On the features and challenges of security and privacy in distributed internet of things [J].
Roman, Rodrigo ;
Zhou, Jianying ;
Lopez, Javier .
COMPUTER NETWORKS, 2013, 57 (10) :2266-2279