• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

保障基于云的物联网安全:挑战与应对措施

Securing Cloud-Based Internet of Things: Challenges and Mitigations.

作者信息

Singh Nivedita, Buyya Rajkumar, Kim Hyoungshick

机构信息

Department of Computer Science & Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea.

Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Parkville, VIC 3010, Australia.

出版信息

Sensors (Basel). 2024 Dec 26;25(1):79. doi: 10.3390/s25010079.

DOI:10.3390/s25010079
PMID:39796870
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11723188/
Abstract

The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. Moreover, IoT services often handle sensitive user data, which could be exploited by malicious actors or unauthorized service providers. As IoT ecosystems expand, the convergence of traditional and cloud-based systems presents unique security threats in the absence of uniform regulations. Cloud-based IoT systems, enabled by Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) models, offer flexibility and scalability but also pose additional security risks. The intricate interaction between these systems and traditional IoT devices demands comprehensive strategies to protect data integrity and user privacy. This paper highlights the pressing security concerns associated with the widespread adoption of IoT devices and services. We propose viable solutions to bridge the existing security gaps while anticipating and preparing for future challenges. This paper provides a detailed survey of the key security challenges that IoT services are currently facing. We also suggest proactive strategies to mitigate these risks, thereby strengthening the overall security of IoT devices and services.

摘要

近年来,物联网(IoT)取得了显著进展,导致数字领域发生了范式转变。然而,这些技术进步带来了新的挑战,尤其是在网络安全方面。物联网设备本质上与互联网相连,容易受到各种形式的攻击。此外,物联网服务通常处理敏感的用户数据,这些数据可能会被恶意行为者或未经授权的服务提供商利用。随着物联网生态系统的扩展,在缺乏统一法规的情况下,传统系统与基于云的系统的融合带来了独特的安全威胁。基于平台即服务(PaaS)和基础设施即服务(IaaS)模型的基于云的物联网系统提供了灵活性和可扩展性,但也带来了额外的安全风险。这些系统与传统物联网设备之间复杂的交互需要全面的策略来保护数据完整性和用户隐私。本文强调了与物联网设备和服务广泛采用相关的紧迫安全问题。我们提出了可行的解决方案,以弥合现有的安全差距,同时预测并应对未来的挑战。本文对物联网服务当前面临的关键安全挑战进行了详细调查。我们还建议采取积极策略来降低这些风险,从而加强物联网设备和服务的整体安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/d197bae1fbc4/sensors-25-00079-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/37713cc35825/sensors-25-00079-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/c85dc88aafa6/sensors-25-00079-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/8d9d5b2410a7/sensors-25-00079-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/d197bae1fbc4/sensors-25-00079-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/37713cc35825/sensors-25-00079-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/c85dc88aafa6/sensors-25-00079-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/8d9d5b2410a7/sensors-25-00079-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fecc/11723188/d197bae1fbc4/sensors-25-00079-g004.jpg

相似文献

1
Securing Cloud-Based Internet of Things: Challenges and Mitigations.保障基于云的物联网安全:挑战与应对措施
Sensors (Basel). 2024 Dec 26;25(1):79. doi: 10.3390/s25010079.
2
Device-Based Security to Improve User Privacy in the Internet of Things .基于设备的安全性提高物联网中的用户隐私。
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.
3
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.探索物联网(IoT)的安全威胁与解决方案:从漏洞到警惕性的技术
Front Artif Intell. 2024 May 15;7:1397480. doi: 10.3389/frai.2024.1397480. eCollection 2024.
4
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.
5
Security Requirements for the Internet of Things: A Systematic Approach.物联网的安全要求:一种系统方法。
Sensors (Basel). 2020 Oct 19;20(20):5897. doi: 10.3390/s20205897.
6
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.
7
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.基于传感与数据分析分层架构的物联网安全调查
Sensors (Basel). 2020 Jun 28;20(13):3625. doi: 10.3390/s20133625.
8
Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism.保障支持物联网的智能医疗系统安全:一种基于物理不可克隆函数的资源高效认证机制。
Heliyon. 2024 Sep 10;10(18):e37577. doi: 10.1016/j.heliyon.2024.e37577. eCollection 2024 Sep 30.
9
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function.iAKA-CIoT:一种使用物理不可克隆功能的改进型云物联网认证与密钥协商方案
Sensors (Basel). 2022 Aug 20;22(16):6264. doi: 10.3390/s22166264.
10
Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review.利用区块链技术确保物联网中的安全和隐私方面:系统文献回顾。
Sensors (Basel). 2023 Jan 10;23(2):788. doi: 10.3390/s23020788.

引用本文的文献

1
Advancements in Biomedical Sensors for Early Detection of Failure in Hip and Knee Implants: Scoping Review on Potential Sensors for Implant Integration.用于早期检测髋关节和膝关节植入物失效的生物医学传感器进展:植入物集成潜在传感器的综述
Ann Biomed Eng. 2025 Jul 2. doi: 10.1007/s10439-025-03780-5.
2
Gel-Based Self-Powered Nanogenerators: Materials, Mechanisms, and Emerging Opportunities.基于凝胶的自供电纳米发电机:材料、机制及新兴机遇
Gels. 2025 Jun 12;11(6):451. doi: 10.3390/gels11060451.
3
Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices.

本文引用的文献

1
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.基于车联网中信标数据包的女巫攻击检测与溯源机制
Sensors (Basel). 2024 Mar 27;24(7):2153. doi: 10.3390/s24072153.
2
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.利用以太坊区块链技术防止物联网设备的 DDoS 攻击。
Sensors (Basel). 2022 Sep 8;22(18):6806. doi: 10.3390/s22186806.
3
An Authentication-Based Secure Data Aggregation Method in Internet of Things.一种基于认证的物联网安全数据聚合方法。
基于大语言模型的受保护接口规避:物联网设备中访问控制漏洞的自动发现
Sensors (Basel). 2025 May 5;25(9):2913. doi: 10.3390/s25092913.
J Grid Comput. 2022;20(3):29. doi: 10.1007/s10723-022-09619-w. Epub 2022 Aug 15.
4
Concept Review of a Cloud-Based Smart Battery Management System for Lithium-Ion Batteries: Feasibility, Logistics, and Functionality.基于云的锂离子电池智能电池管理系统概念综述:可行性、物流与功能
Batteries (Basel). 2022 Feb 18;8(2):19. doi: 10.3390/batteries8020019. eCollection 2022 Feb.
5
IoT technologies in smart environment: security issues and future enhancements.物联网技术在智能环境中的应用:安全问题及未来的改进。
Environ Sci Pollut Res Int. 2022 Jul;29(32):47969-47987. doi: 10.1007/s11356-022-20132-1. Epub 2022 May 11.
6
IOT based portable heart rate and SpO2 pulse oximeter.基于物联网的便携式心率和血氧脉搏血氧仪。
HardwareX. 2022 Apr;11:e00309. doi: 10.1016/j.ohx.2022.e00309. Epub 2022 Apr 21.
7
Mitigating consumer privacy breach in smart grid using obfuscation-based generative adversarial network.使用基于混淆的生成对抗网络减轻智能电网中的消费者隐私泄露问题。
Math Biosci Eng. 2022 Jan 24;19(4):3350-3368. doi: 10.3934/mbe.2022155.
8
Predictive Maintenance and Intelligent Sensors in Smart Factory: Review.智能工厂中的预测性维护和智能传感器:综述。
Sensors (Basel). 2021 Feb 20;21(4):1470. doi: 10.3390/s21041470.
9
Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study.面向安全和隐私保护的物联网智能家居:体系结构和实验研究。
Sensors (Basel). 2020 Oct 28;20(21):6131. doi: 10.3390/s20216131.
10
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.