• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

威胁建模——如何可视化对IOTA的攻击?

Threat Modeling-How to Visualize Attacks on IOTA?

作者信息

Ullah Ikram, de Roode Gerard, Meratnia Nirvana, Havinga Paul

机构信息

Pervasive Systems Group, Department of Computer Science, University of Twente Enschede, 7522 NB Enschede, The Netherlands.

Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, 7522 NB Enschede, The Netherlands.

出版信息

Sensors (Basel). 2021 Mar 6;21(5):1834. doi: 10.3390/s21051834.

DOI:10.3390/s21051834
PMID:33800712
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7975986/
Abstract

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.

摘要

物联网(IoT)已被部署在大量智能应用中,旨在给我们的生活带来便利和舒适。然而,随着物联网应用的扩展,安全和隐私漏洞的数量也在增加,这使得现有安全和信任机制的弹性受到质疑。此外,同期的集中式技术对诸如智能物流等广泛的物联网应用在可扩展性、透明度和效率方面构成了重大挑战,在智能物流中,数百万物联网设备需要同时连接。相比之下,IOTA是一种分布式账本技术,它提供了弹性的安全和信任机制以及去中心化架构,以克服物联网的障碍。IOTA已经在许多应用中得到实施,并在实际应用中清楚地证明了其重要性。不幸的是,与任何其他技术一样,IOTA也存在安全漏洞。本研究的目的是探索和突出IOTA的安全漏洞,同时展示威胁建模在评估分布式账本技术安全漏洞方面的价值。我们从可行性和影响方面仔细审查了IOTA的漏洞,并在适用的情况下提出了预防技术。为了识别IOTA的漏洞,我们查阅了现有文献和在线博客。到目前为止,关于这个主题的可用文献非常有限。据我们所知,传统期刊、会议和书籍中几乎没有涉及IOTA的内容。我们总共识别出了六个漏洞。我们使用通用漏洞评分系统(CVSS v3.0)根据这些漏洞的可行性和影响对其进行进一步分类。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/f00b06c85ba3/sensors-21-01834-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/e89e5efa9689/sensors-21-01834-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/9229ffc9fd99/sensors-21-01834-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/65304755911c/sensors-21-01834-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/6b812d2f2825/sensors-21-01834-g0A4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/bb1a8585b662/sensors-21-01834-g0A5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/4ef55f48aecf/sensors-21-01834-g0A6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/c8d03ef72962/sensors-21-01834-g0A7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/7ceb57900214/sensors-21-01834-g0A8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/70f7a4017553/sensors-21-01834-g0A9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/18b6f7136e74/sensors-21-01834-g0A10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/70e76ca010cd/sensors-21-01834-g0A11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/b1a5a1d38383/sensors-21-01834-g0A12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/66a41228e399/sensors-21-01834-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/5ab420f98faf/sensors-21-01834-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/a84987742b89/sensors-21-01834-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/69f993ad5fd1/sensors-21-01834-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/5ba6714b68e4/sensors-21-01834-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/6cf33148433d/sensors-21-01834-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/85e0a325dc9e/sensors-21-01834-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/28fa28d10012/sensors-21-01834-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/87191744f2d9/sensors-21-01834-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/337631f461f1/sensors-21-01834-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/c1cf74ad9847/sensors-21-01834-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/dba080b8c9d0/sensors-21-01834-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/1edd51a864a3/sensors-21-01834-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/2f0b6ba9c6c6/sensors-21-01834-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/ade3ad070ae7/sensors-21-01834-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/3a491b3a8254/sensors-21-01834-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/f00b06c85ba3/sensors-21-01834-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/e89e5efa9689/sensors-21-01834-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/9229ffc9fd99/sensors-21-01834-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/65304755911c/sensors-21-01834-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/6b812d2f2825/sensors-21-01834-g0A4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/bb1a8585b662/sensors-21-01834-g0A5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/4ef55f48aecf/sensors-21-01834-g0A6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/c8d03ef72962/sensors-21-01834-g0A7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/7ceb57900214/sensors-21-01834-g0A8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/70f7a4017553/sensors-21-01834-g0A9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/18b6f7136e74/sensors-21-01834-g0A10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/70e76ca010cd/sensors-21-01834-g0A11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/b1a5a1d38383/sensors-21-01834-g0A12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/66a41228e399/sensors-21-01834-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/5ab420f98faf/sensors-21-01834-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/a84987742b89/sensors-21-01834-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/69f993ad5fd1/sensors-21-01834-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/5ba6714b68e4/sensors-21-01834-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/6cf33148433d/sensors-21-01834-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/85e0a325dc9e/sensors-21-01834-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/28fa28d10012/sensors-21-01834-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/87191744f2d9/sensors-21-01834-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/337631f461f1/sensors-21-01834-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/c1cf74ad9847/sensors-21-01834-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/dba080b8c9d0/sensors-21-01834-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/1edd51a864a3/sensors-21-01834-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/2f0b6ba9c6c6/sensors-21-01834-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/ade3ad070ae7/sensors-21-01834-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/3a491b3a8254/sensors-21-01834-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2822/7975986/f00b06c85ba3/sensors-21-01834-g017.jpg

相似文献

1
Threat Modeling-How to Visualize Attacks on IOTA?威胁建模——如何可视化对IOTA的攻击?
Sensors (Basel). 2021 Mar 6;21(5):1834. doi: 10.3390/s21051834.
2
Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy.利用分布式账本技术和支持IOTA的物联网实现高效数据通信,以构建未来的机器对机器经济。
Sensors (Basel). 2021 Jun 25;21(13):4354. doi: 10.3390/s21134354.
3
Offline Scaling of IoT Devices in IOTA Blockchain.IOTA区块链中物联网设备的离线扩展
Sensors (Basel). 2022 Feb 12;22(4):1411. doi: 10.3390/s22041411.
4
Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies.加速健康数据共享:基于物联网和分布式账本技术的解决方案
J Med Internet Res. 2019 Jun 6;21(6):e13583. doi: 10.2196/13583.
5
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.结合IOTA和基于属性的加密用于物联网中的访问控制。
Sensors (Basel). 2021 Jul 26;21(15):5053. doi: 10.3390/s21155053.
6
A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management.一种用于物联网数据管理的集成多个区块链的跨链解决方案。
Sensors (Basel). 2019 May 1;19(9):2042. doi: 10.3390/s19092042.
7
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.基于物联网的智能家居的网络与物理安全漏洞评估
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
8
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.探索物联网(IoT)的安全威胁与解决方案:从漏洞到警惕性的技术
Front Artif Intell. 2024 May 15;7:1397480. doi: 10.3389/frai.2024.1397480. eCollection 2024.
9
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.面向物联网应用的区块链设想访问控制:全面综述与未来方向
Telecommun Syst. 2022;81(1):125-173. doi: 10.1007/s11235-022-00938-7. Epub 2022 Jul 20.
10
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.用于保障边缘物联网安全的超级账本织物区块链
Sensors (Basel). 2021 Jan 7;21(2):359. doi: 10.3390/s21020359.

引用本文的文献

1
Governance of a Blockchain-Enabled IoT Ecosystem: A Variable Geometry Approach.基于区块链的物联网生态系统治理:一种可变几何方法。
Sensors (Basel). 2023 Nov 7;23(22):9031. doi: 10.3390/s23229031.
2
HeriLedger-A New Generation of Blockchains for Cultural Heritage Preservation.赫里账本——用于文化遗产保护的新一代区块链。
Sensors (Basel). 2022 Nov 18;22(22):8913. doi: 10.3390/s22228913.

本文引用的文献

1
A Decentralized Privacy-Preserving Healthcare Blockchain for IoT.物联网去中心化隐私保护医疗区块链
Sensors (Basel). 2019 Jan 15;19(2):326. doi: 10.3390/s19020326.
2
Secure and Trustable Electronic Medical Records Sharing using Blockchain.利用区块链实现安全可信的电子病历共享
AMIA Annu Symp Proc. 2018 Apr 16;2017:650-659. eCollection 2017.