• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

迈向更安全的物联网——物联网漏洞数据源综述

Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.

作者信息

Rytel Marcin, Felkner Anna, Janiszewski Marek

机构信息

Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, Poland.

出版信息

Sensors (Basel). 2020 Oct 22;20(21):5969. doi: 10.3390/s20215969.

DOI:10.3390/s20215969
PMID:33105564
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7659474/
Abstract

The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on the IoT in existence. The national vulnerability databases contain some IoT related entries, but they lack mechanisms to distinguish them from the remaining vulnerabilities. Moreover, information about many vulnerabilities affecting the IoT world never reaches these databases but can still be found scattered over the Internet. This review summarizes our effort at identifying and evaluating publicly available sources of information about vulnerabilities, focusing on their usefulness in the scope of IoT. The results of our search show that there is not yet a single satisfactory source covering vulnerabilities affecting IoT devices and software available.

摘要

物联网(IoT)的安全性是一个重要但常被忽视的主题。具体而言,关于影响连接设备的漏洞的公开可用信息源并不令人满意。我们的研究表明,虽然互联网上有相关信息,但目前没有单一的专注于物联网的数据服务。国家漏洞数据库包含一些与物联网相关的条目,但它们缺乏将这些条目与其他漏洞区分开来的机制。此外,许多影响物联网领域的漏洞信息从未进入这些数据库,但仍可在互联网上零散地找到。本综述总结了我们在识别和评估关于漏洞的公开可用信息源方面所做的工作,重点关注它们在物联网范围内的实用性。我们的搜索结果表明,目前还没有一个令人满意的涵盖影响物联网设备和软件的漏洞的信息源。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/4386edfcb5ca/sensors-20-05969-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/aec5f7f91e97/sensors-20-05969-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/35cdf9b129b5/sensors-20-05969-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/437366501c2d/sensors-20-05969-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/4386edfcb5ca/sensors-20-05969-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/aec5f7f91e97/sensors-20-05969-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/35cdf9b129b5/sensors-20-05969-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/437366501c2d/sensors-20-05969-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3581/7659474/4386edfcb5ca/sensors-20-05969-g004.jpg

相似文献

1
Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.迈向更安全的物联网——物联网漏洞数据源综述
Sensors (Basel). 2020 Oct 22;20(21):5969. doi: 10.3390/s20215969.
2
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things.自动可操作信息处理和信任管理,实现更安全的物联网。
Sensors (Basel). 2021 Jun 25;21(13):4359. doi: 10.3390/s21134359.
3
The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.物联网低端设备操作系统安全漏洞的存在、趋势和原因。
Sensors (Basel). 2021 Mar 26;21(7):2329. doi: 10.3390/s21072329.
4
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
5
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.基于物联网的智能家居的网络与物理安全漏洞评估
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
6
Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.基于命名实体识别的物联网网络网络安全态势诊断自动化系统。
Sensors (Basel). 2019 Aug 1;19(15):3380. doi: 10.3390/s19153380.
7
Threat Modeling-How to Visualize Attacks on IOTA?威胁建模——如何可视化对IOTA的攻击?
Sensors (Basel). 2021 Mar 6;21(5):1834. doi: 10.3390/s21051834.
8
A Review of IoT Firmware Vulnerabilities and Auditing Techniques.物联网固件漏洞与审计技术综述
Sensors (Basel). 2024 Jan 22;24(2):708. doi: 10.3390/s24020708.
9
Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk.检测物联网设备及其如何使大型异构网络面临安全风险。
Sensors (Basel). 2019 Sep 23;19(19):4107. doi: 10.3390/s19194107.
10
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.基于物联网(IoT)的安全、轻量级人体区域网络(BAN)医疗保健系统设计。
Sensors (Basel). 2017 Dec 15;17(12):2919. doi: 10.3390/s17122919.

引用本文的文献

1
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things.自动可操作信息处理和信任管理,实现更安全的物联网。
Sensors (Basel). 2021 Jun 25;21(13):4359. doi: 10.3390/s21134359.
2
A Fully Open-Source Approach to Intelligent Edge Computing: AGILE's Lesson.一种用于智能边缘计算的完全开源方法:AGILE 的经验教训。
Sensors (Basel). 2021 Feb 12;21(4):1309. doi: 10.3390/s21041309.
3
Security and Privacy Techniques in IoT Environment.物联网环境中的安全和隐私技术。

本文引用的文献

1
IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey.物联网要素、分层架构和安全问题:全面调查。
Sensors (Basel). 2018 Aug 24;18(9):2796. doi: 10.3390/s18092796.
Sensors (Basel). 2020 Dec 22;21(1):1. doi: 10.3390/s21010001.