• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

探索物联网(IoT)的安全威胁与解决方案:从漏洞到警惕性的技术

Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.

作者信息

Sahu Swastik Kumar, Mazumdar Kaushik

机构信息

Department of Electronics Engineering, IIT (ISM), Dhanbad, India.

出版信息

Front Artif Intell. 2024 May 15;7:1397480. doi: 10.3389/frai.2024.1397480. eCollection 2024.

DOI:10.3389/frai.2024.1397480
PMID:38845684
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11153900/
Abstract

The rapid proliferation of Internet of Things (IoT) devices across various industries has revolutionized the way we interact with technology. However, this widespread adoption has also brought about significant security challenges that must be addressed to ensure the integrity and confidentiality of data transmitted and processed by IoT systems. This survey paper delves into the diverse array of security threats faced by IoT devices and networks, ranging from data breaches and unauthorized access to physical tampering and denial-of-service attacks. By examining the vulnerabilities inherent in IoT ecosystems, we highlight the importance of implementing robust security measures to safeguard sensitive information and ensure the reliable operation of connected devices. Furthermore, we explore cutting-edge technologies such as blockchain, edge computing, and machine learning as potential solutions to enhance the security posture of IoT deployments. Through a comprehensive analysis of existing security frameworks and best practices, this paper aims to provide valuable insights for researchers, practitioners, and policymakers seeking to fortify the resilience of IoT systems in an increasingly interconnected world.

摘要

物联网(IoT)设备在各行各业的迅速普及彻底改变了我们与技术交互的方式。然而,这种广泛采用也带来了重大的安全挑战,必须加以解决,以确保物联网系统传输和处理的数据的完整性和保密性。这篇综述论文深入探讨了物联网设备和网络面临的各种安全威胁,从数据泄露、未经授权的访问到物理篡改和拒绝服务攻击。通过研究物联网生态系统中固有的漏洞,我们强调了实施强大安全措施以保护敏感信息并确保连接设备可靠运行的重要性。此外,我们探索了诸如区块链、边缘计算和机器学习等前沿技术,将其作为增强物联网部署安全态势的潜在解决方案。通过对现有安全框架和最佳实践的全面分析,本文旨在为寻求在日益互联的世界中增强物联网系统弹性的研究人员、从业者和政策制定者提供有价值的见解。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/e13a65afec0e/frai-07-1397480-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/6f065dd6fbc8/frai-07-1397480-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/9b1a138576fc/frai-07-1397480-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/6197ddc7f064/frai-07-1397480-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/ed478068d977/frai-07-1397480-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/939e949386ca/frai-07-1397480-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/e13a65afec0e/frai-07-1397480-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/6f065dd6fbc8/frai-07-1397480-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/9b1a138576fc/frai-07-1397480-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/6197ddc7f064/frai-07-1397480-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/ed478068d977/frai-07-1397480-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/939e949386ca/frai-07-1397480-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/39e3/11153900/e13a65afec0e/frai-07-1397480-g006.jpg

相似文献

1
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.探索物联网(IoT)的安全威胁与解决方案:从漏洞到警惕性的技术
Front Artif Intell. 2024 May 15;7:1397480. doi: 10.3389/frai.2024.1397480. eCollection 2024.
2
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.
3
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
4
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.
5
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
6
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.物联网系统中的入侵检测:关于利用多接入边缘计算、机器学习和数据集的设计方法的综述
Sensors (Basel). 2022 May 14;22(10):3744. doi: 10.3390/s22103744.
7
Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.通过物联网通信安全和智能医疗保健中的保护来加强生物医学微机电系统中的隐私和数据安全。
Sensors (Basel). 2023 Nov 3;23(21):8944. doi: 10.3390/s23218944.
8
A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.基于机器学习算法的物联网网络异常检测方案的综合研究。
Sensors (Basel). 2021 Dec 13;21(24):8320. doi: 10.3390/s21248320.
9
Internet of Things: Security and Solutions Survey.物联网:安全与解决方案调查。
Sensors (Basel). 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433.
10
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.物联网的关键网络安全分析与未来研究方向:全面综述。
Sensors (Basel). 2023 Apr 19;23(8):4117. doi: 10.3390/s23084117.

引用本文的文献

1
Enhancing Cancer Care through Blockchain Technology.通过区块链技术提升癌症护理。
Asian Pac J Cancer Prev. 2025 Apr 1;26(4):1139-1153. doi: 10.31557/APJCP.2025.26.4.1139.

本文引用的文献

1
Development of the Advanced Encryption Standard.高级加密标准的发展。
J Res Natl Inst Stand Technol. 2021 Aug 16;126:126024. doi: 10.6028/jres.126.024. eCollection 2021.