• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

验证对话:一种物联网应用的验证与安全机制

VerificationTalk: A Verification and Security Mechanism for IoT Applications.

作者信息

Shieh Min-Zheng, Lin Yi-Bing, Hsu Yin-Jui

机构信息

Information Technology Service Center, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan.

Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan.

出版信息

Sensors (Basel). 2021 Nov 9;21(22):7449. doi: 10.3390/s21227449.

DOI:10.3390/s21227449
PMID:34833525
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8619704/
Abstract

An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime monitor and offline by using American Fuzzy Lop (AFL). The runtime monitor is capable of intercepting potentially harmful data targeting IoT devices. When VerificationTalk detects errors, it provides feedback for debugging. VerificationTalk also assists in building secure IoT applications by identifying security loopholes in network applications. By the appropriate design of the IoTtalk execution engine, the testing capacity of AFLtalk is three times that of traditional AFL approaches.

摘要

物联网(IoT)应用通常涉及设备域和网络域的实现。在这种双域环境中,应用程序开发人员可能会实现错误的网络功能和/或连接一些本不应链接的物联网设备,这会导致对网络功能执行错误的操作。为了解决这些问题,我们提出了VerificationTalk机制来防止不适当的物联网应用部署。VerificationTalk由两个子系统组成:用于验证物联网设备配置的BigraphTalk子系统;以及用于验证网络功能的AFLtalk。VerificationTalk提供了通过使用运行时监视器进行在线异常检测和通过使用美国模糊 lop(AFL)进行离线异常检测的机制。运行时监视器能够拦截针对物联网设备的潜在有害数据。当VerificationTalk检测到错误时,它会提供调试反馈。VerificationTalk还通过识别网络应用中的安全漏洞来协助构建安全的物联网应用。通过对IoTtalk执行引擎的适当设计,AFLtalk的测试能力是传统AFL方法的三倍。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a8696f53ce26/sensors-21-07449-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/8a9c7b5230a8/sensors-21-07449-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/f3dc9815a727/sensors-21-07449-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/0f1b4d16f75c/sensors-21-07449-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/195d6bf32771/sensors-21-07449-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/c2f4f0cda106/sensors-21-07449-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a50627264696/sensors-21-07449-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/ee9650d5a528/sensors-21-07449-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/6bef0112a531/sensors-21-07449-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/5eee3880545e/sensors-21-07449-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/3e512d420733/sensors-21-07449-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/cd75b19f3067/sensors-21-07449-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a63e6e59d4d0/sensors-21-07449-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/5f84abc0c743/sensors-21-07449-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/3b5dfcd5ee2c/sensors-21-07449-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/fd4767d6a3f9/sensors-21-07449-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a8696f53ce26/sensors-21-07449-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/8a9c7b5230a8/sensors-21-07449-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/f3dc9815a727/sensors-21-07449-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/0f1b4d16f75c/sensors-21-07449-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/195d6bf32771/sensors-21-07449-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/c2f4f0cda106/sensors-21-07449-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a50627264696/sensors-21-07449-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/ee9650d5a528/sensors-21-07449-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/6bef0112a531/sensors-21-07449-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/5eee3880545e/sensors-21-07449-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/3e512d420733/sensors-21-07449-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/cd75b19f3067/sensors-21-07449-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a63e6e59d4d0/sensors-21-07449-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/5f84abc0c743/sensors-21-07449-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/3b5dfcd5ee2c/sensors-21-07449-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/fd4767d6a3f9/sensors-21-07449-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ab3b/8619704/a8696f53ce26/sensors-21-07449-g016.jpg

相似文献

1
VerificationTalk: A Verification and Security Mechanism for IoT Applications.验证对话:一种物联网应用的验证与安全机制
Sensors (Basel). 2021 Nov 9;21(22):7449. doi: 10.3390/s21227449.
2
DeviceTalk: A No-Code Low-Code IoT Device Code Generation.设备对话:一种无代码/低代码物联网设备代码生成方法
Sensors (Basel). 2022 Jun 30;22(13):4942. doi: 10.3390/s22134942.
3
Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms.基于物联网的区块链网络与机器学习算法集成的安全健身框架。
Sensors (Basel). 2021 Feb 26;21(5):1640. doi: 10.3390/s21051640.
4
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
5
Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments.基于智能合约的可靠任务管理,用于物联网环境中传感与驱动任务的运行时验证。
Sensors (Basel). 2020 Feb 22;20(4):1207. doi: 10.3390/s20041207.
6
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.基于边缘的物联网部署的轻量级设备认证和密钥管理机制(LDAKM-EIoT)
Sensors (Basel). 2019 Dec 14;19(24):5539. doi: 10.3390/s19245539.
7
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
8
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.基于IEEE 802.11的物联网接入网络中资源受限设备的认证与密钥管理机制
Sensors (Basel). 2017 Sep 21;17(10):2170. doi: 10.3390/s17102170.
9
SimTalk: Simulation of IoT Applications.SimTalk:物联网应用的模拟
Sensors (Basel). 2020 Apr 30;20(9):2563. doi: 10.3390/s20092563.
10
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.用于保障边缘物联网安全的超级账本织物区块链
Sensors (Basel). 2021 Jan 7;21(2):359. doi: 10.3390/s21020359.

引用本文的文献

1
DeviceTalk: A No-Code Low-Code IoT Device Code Generation.设备对话:一种无代码/低代码物联网设备代码生成方法
Sensors (Basel). 2022 Jun 30;22(13):4942. doi: 10.3390/s22134942.

本文引用的文献

1
SimTalk: Simulation of IoT Applications.SimTalk:物联网应用的模拟
Sensors (Basel). 2020 Apr 30;20(9):2563. doi: 10.3390/s20092563.