• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过漏洞自我监测提高关键物联网系统中Web服务器的安全性。

Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities.

作者信息

Song Linxuan, García-Valls Marisol

机构信息

Beijing University of Posts and Telecommunications, Beijing 100876, China.

Universitat Politècnica de València, 46022 Valencia, Spain.

出版信息

Sensors (Basel). 2022 Jul 2;22(13):5004. doi: 10.3390/s22135004.

DOI:10.3390/s22135004
PMID:35808499
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9269696/
Abstract

IoT (Internet of Things) systems are complex ones that may comprise large numbers of sensing and actuating devices; and servers that store data and further configure the operation of such devices. Usually, these systems involve real-time operation as they are closely bound to particular physical processes. This real-time operation is often threatened by the security solutions that are put in place to alleviate the ever growing attack surface in IoT. This paper focuses on critical IoT domains where less attention has been paid to the web security aspects. The main reason is that, up to quite recently, web technologies have been considered unreliable and had to be avoided by design in critical systems. In this work, we focus on the server side and on how attacks propagate from server to client as vulnerabilities and from client to unprotected servers; we describe the concerns and vulnerabilities introduced by the intensive usage of web interfaces in IoT from the server templating engines perspective. In this context, we propose an approach to perform self monitoring on the server side, propagating the self monitoring to the IoT system devices; the aim is to provide rapid detection of security vulnerabilities with a low overhead that is transparent to the server normal operation. This approach improves the control over the vulnerability detection. We show a set of experiments that validate the feasibility of our approach.

摘要

物联网(IoT)系统是复杂的系统,可能由大量传感和驱动设备以及存储数据并进一步配置此类设备操作的服务器组成。通常,这些系统涉及实时操作,因为它们与特定物理过程紧密相关。这种实时操作经常受到为缓解物联网中不断扩大的攻击面而实施的安全解决方案的威胁。本文关注的是物联网的关键领域,这些领域在网络安全方面受到的关注较少。主要原因是,直到最近,网络技术一直被认为不可靠,在关键系统中必须通过设计加以避免。在这项工作中,我们关注服务器端以及攻击如何从服务器传播到客户端(作为漏洞)以及从客户端传播到未受保护的服务器;我们从服务器模板引擎的角度描述了物联网中大量使用网络接口所带来的问题和漏洞。在此背景下,我们提出一种在服务器端进行自我监控的方法,并将自我监控传播到物联网系统设备;目的是在对服务器正常操作透明的情况下,以低开销快速检测安全漏洞。这种方法改进了对漏洞检测的控制。我们展示了一组实验,验证了我们方法的可行性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/24e549e6d48f/sensors-22-05004-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/913abc7a0536/sensors-22-05004-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/49b27a156ed7/sensors-22-05004-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/0666aeda7227/sensors-22-05004-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/859343748253/sensors-22-05004-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/6228b35d4754/sensors-22-05004-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/e754b237e0c7/sensors-22-05004-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/ca11f42f9145/sensors-22-05004-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/c1677d057010/sensors-22-05004-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/24e549e6d48f/sensors-22-05004-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/913abc7a0536/sensors-22-05004-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/49b27a156ed7/sensors-22-05004-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/0666aeda7227/sensors-22-05004-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/859343748253/sensors-22-05004-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/6228b35d4754/sensors-22-05004-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/e754b237e0c7/sensors-22-05004-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/ca11f42f9145/sensors-22-05004-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/c1677d057010/sensors-22-05004-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6806/9269696/24e549e6d48f/sensors-22-05004-g009.jpg

相似文献

1
Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities.通过漏洞自我监测提高关键物联网系统中Web服务器的安全性。
Sensors (Basel). 2022 Jul 2;22(13):5004. doi: 10.3390/s22135004.
2
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.基于智能家居的物联网,利用身体传感器实现分诊和优先级系统的实时安全远程健康监测:多驱动系统评价。
J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z.
3
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.使用物联网入侵检测系统预防MQTT漏洞
Sensors (Basel). 2022 Jan 12;22(2):567. doi: 10.3390/s22020567.
4
Modified graph-based algorithm to analyze security threats in IoT.用于分析物联网安全威胁的基于图的改进算法。
PeerJ Comput Sci. 2023 Dec 8;9:e1743. doi: 10.7717/peerj-cs.1743. eCollection 2023.
5
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices.物理不可克隆函数和散列是相互认证物联网设备所需的全部。
Sensors (Basel). 2020 Aug 5;20(16):4361. doi: 10.3390/s20164361.
6
Cyber-physical systems security: Limitations, issues and future trends.网络物理系统安全:局限性、问题与未来趋势。
Microprocess Microsyst. 2020 Sep;77:103201. doi: 10.1016/j.micpro.2020.103201. Epub 2020 Jul 8.
7
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.基于物联网的智能家居的网络与物理安全漏洞评估
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
8
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
9
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection.通过跨站脚本攻击漏洞检测增强基于Web的物联网服务安全性
Sensors (Basel). 2023 Nov 25;23(23):9407. doi: 10.3390/s23239407.
10
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.物联网系统完整性:工业应用的安全性、攻击及对策的全面调查。
Sensors (Basel). 2021 May 24;21(11):3654. doi: 10.3390/s21113654.

引用本文的文献

1
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario.一种新型认证协议,用于确保新冠疫情及未来大流行场景下医疗物联网之间的保密性。
Internet Things (Amst). 2023 Jul;22:100797. doi: 10.1016/j.iot.2023.100797. Epub 2023 Apr 28.
2
An Evaluation Process for IoT Platforms in Time-Sensitive Domains.面向实时敏感领域的物联网平台评估流程。
Sensors (Basel). 2022 Dec 5;22(23):9501. doi: 10.3390/s22239501.