Suppr超能文献

资源受限的物联网设备和网络的隐私与安全:研究挑战与机遇

Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities.

作者信息

Li Shancang, Song Houbing, Iqbal Muddesar

机构信息

Department of Computer Science and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK.

Department of Electrical, Computer, Software, and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, FL 32114, USA.

出版信息

Sensors (Basel). 2019 Apr 25;19(8):1935. doi: 10.3390/s19081935.

Abstract

With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS systems, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as difficult challenges because the devices have not been designed to have effective security features.

摘要

随着物联网(IoT)和信息物理系统(CPS)的指数级增长,近年来已经开发并部署了各种各样的物联网应用。为了满足物联网和信息物理系统中的异构应用需求,部署了许多资源受限的物联网设备,其中隐私和安全已成为难题,因为这些设备在设计时并未具备有效的安全功能。

相似文献

2
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
Sensors (Basel). 2018 Oct 4;18(10):3326. doi: 10.3390/s18103326.
3
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
Sensors (Basel). 2020 Feb 5;20(3):844. doi: 10.3390/s20030844.
4
Device-Based Security to Improve User Privacy in the Internet of Things .
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.
5
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.
Sensors (Basel). 2021 Jan 7;21(2):359. doi: 10.3390/s21020359.
6
Cyber-physical systems security: Limitations, issues and future trends.
Microprocess Microsyst. 2020 Sep;77:103201. doi: 10.1016/j.micpro.2020.103201. Epub 2020 Jul 8.
8
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
9
Security Requirements for the Internet of Things: A Systematic Approach.
Sensors (Basel). 2020 Oct 19;20(20):5897. doi: 10.3390/s20205897.
10
Secure Communications for Resource-Constrained IoT Devices.
Sensors (Basel). 2020 Jun 29;20(13):3637. doi: 10.3390/s20133637.

本文引用的文献

2
Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing.
Sensors (Basel). 2019 Feb 25;19(4):965. doi: 10.3390/s19040965.
3
4
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Sensors (Basel). 2019 Feb 21;19(4):913. doi: 10.3390/s19040913.
5
Energy/Area-Efficient Scalar Multiplication with Binary Edwards Curves for the IoT.
Sensors (Basel). 2019 Feb 10;19(3):720. doi: 10.3390/s19030720.
7
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors (Basel). 2018 Dec 16;18(12):4451. doi: 10.3390/s18124451.
8
Security Cost Aware Data Communication in Low-Power IoT Sensors with Energy Harvesting.
Sensors (Basel). 2018 Dec 12;18(12):4400. doi: 10.3390/s18124400.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验