Outline

  • Abstract
  • Keywords
  • 1. Introduction
  • 2. Iot Security Requirements: Authentication, Confidentiality and Access Control
  • 2.1. Authentication and Confidentiality
  • 2.2. Access Control
  • 3. Privacy in Iot
  • 4. Trust in Iot
  • 5. Enforcement in Iot
  • 6. Secure Middlewares in Iot
  • 7. Mobile Security in Iot
  • 8. Ongoing Projects
  • 9. Conclusions
  • References

رئوس مطالب

  • چکیده
  • کلید واژه ها
  • 1. مقدمه
  • 2. الزامات امنیتی IoT: احراز هویت، محرمانه بودن و کنترل دسترسی
  • 2.1. احراز هویت و محرمانه بودن
  • 2.2. کنترل بر دسترسی
  • 3. حریم خصوصی در IoT
  • 4. اعتماد در اینترنت اشیا (IoT)
  • 5. اجرا در اینترنت اشیا (IoT)
  • 6. میان افزار امن در اینترنت اشیا (IoT)
  • 7. امنیت متحرک در اینترنت اشیا (IoT)
  • 8. پروژه های در حال اجرا
  • 9. نتیجه گیری

Abstract

Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental role. Such requirements include data confidentiality and authentication, access control within the IoT network, privacy and trust among users and things, and the enforcement of security and privacy policies. Traditional security countermeasures cannot be directly applied to IoT technologies due to the different standards and communication stacks involved. Moreover, the high number of interconnected devices arises scalability issues; therefore a flexible infrastructure is needed able to deal with security threats in such a dynamic environment. In this survey we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, and suggesting some hints for future research.

Keywords: - - -

دانلود ترجمه تخصصی این مقاله دانلود رایگان فایل pdf انگلیسی