{"title":"物联网安全攻击分类和新兴解决方案","authors":"Dinesh S. Tundalwar, R. Pandhare, Mayuri Digalwar","doi":"10.1109/PCEMS58491.2023.10136032","DOIUrl":null,"url":null,"abstract":"IoT facilitates communication between objects and different sensors without involving humans. With the growing popularity of IoT and its various applications, the need for rugged security is increasing significantly. IoT generates a great deal of data, but it has a number of constraints, including low processing power, battery power, and limited storage. Because of these constraints, as well as the critical data generated by IoT applications, Security threats impact IoT on a wide scale. There are a variety of modern IoT security attacks at the perception, network, and application layers, which are discussed in this paper. The paper also explores emerging solutions to IoT security threats, as well as carries out comparative analysisbased on state-of-the-art technologies including fog/edge computing, SDN, lightweight cryptography, ML, IoTA, and blockchain. Additionally, the paper addresses the challenges of combining blockchain and the internet of things.","PeriodicalId":330870,"journal":{"name":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Taxonomy of IoT Security Attacks and Emerging Solutions\",\"authors\":\"Dinesh S. Tundalwar, R. Pandhare, Mayuri Digalwar\",\"doi\":\"10.1109/PCEMS58491.2023.10136032\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT facilitates communication between objects and different sensors without involving humans. With the growing popularity of IoT and its various applications, the need for rugged security is increasing significantly. IoT generates a great deal of data, but it has a number of constraints, including low processing power, battery power, and limited storage. Because of these constraints, as well as the critical data generated by IoT applications, Security threats impact IoT on a wide scale. There are a variety of modern IoT security attacks at the perception, network, and application layers, which are discussed in this paper. The paper also explores emerging solutions to IoT security threats, as well as carries out comparative analysisbased on state-of-the-art technologies including fog/edge computing, SDN, lightweight cryptography, ML, IoTA, and blockchain. Additionally, the paper addresses the challenges of combining blockchain and the internet of things.\",\"PeriodicalId\":330870,\"journal\":{\"name\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"volume\":\"237 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PCEMS58491.2023.10136032\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCEMS58491.2023.10136032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Taxonomy of IoT Security Attacks and Emerging Solutions
IoT facilitates communication between objects and different sensors without involving humans. With the growing popularity of IoT and its various applications, the need for rugged security is increasing significantly. IoT generates a great deal of data, but it has a number of constraints, including low processing power, battery power, and limited storage. Because of these constraints, as well as the critical data generated by IoT applications, Security threats impact IoT on a wide scale. There are a variety of modern IoT security attacks at the perception, network, and application layers, which are discussed in this paper. The paper also explores emerging solutions to IoT security threats, as well as carries out comparative analysisbased on state-of-the-art technologies including fog/edge computing, SDN, lightweight cryptography, ML, IoTA, and blockchain. Additionally, the paper addresses the challenges of combining blockchain and the internet of things.