{"title":"分析物联网环境中威胁、漏洞和攻击的安全方法","authors":"Himani Tyagi, Rajendra Kumar","doi":"10.1109/ComPE53109.2021.9752151","DOIUrl":null,"url":null,"abstract":"The importance of the Internet of things in every sphere of human life is quite evident. However, with applications, many serious threats, vulnerabilities, and attacks are emerging from time to time. Thus, it is required to discuss the vulnerabilities and attacks to fully adopt this popular technology with security solutions intact. Therefore, this paper includes a survey from three aspects such as IoT market opportunities with security challenges, recently identified threats, vulnerabilities, and attacks on IoT with proposed solutions, and the importance of modern technologies such as machine learning, cloud computing, fog computing, edge computing and, blockchain for IoT security solutions. The main contribution of this work is to provide insights into IoT security challenges from various aspects like device and sensor based, software - application based, communication channel based, and future predictions.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analyzing Security Approaches for Threats, Vulnerabilities, and attacks in an IoT Environment\",\"authors\":\"Himani Tyagi, Rajendra Kumar\",\"doi\":\"10.1109/ComPE53109.2021.9752151\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The importance of the Internet of things in every sphere of human life is quite evident. However, with applications, many serious threats, vulnerabilities, and attacks are emerging from time to time. Thus, it is required to discuss the vulnerabilities and attacks to fully adopt this popular technology with security solutions intact. Therefore, this paper includes a survey from three aspects such as IoT market opportunities with security challenges, recently identified threats, vulnerabilities, and attacks on IoT with proposed solutions, and the importance of modern technologies such as machine learning, cloud computing, fog computing, edge computing and, blockchain for IoT security solutions. The main contribution of this work is to provide insights into IoT security challenges from various aspects like device and sensor based, software - application based, communication channel based, and future predictions.\",\"PeriodicalId\":211704,\"journal\":{\"name\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ComPE53109.2021.9752151\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Performance Evaluation (ComPE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComPE53109.2021.9752151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analyzing Security Approaches for Threats, Vulnerabilities, and attacks in an IoT Environment
The importance of the Internet of things in every sphere of human life is quite evident. However, with applications, many serious threats, vulnerabilities, and attacks are emerging from time to time. Thus, it is required to discuss the vulnerabilities and attacks to fully adopt this popular technology with security solutions intact. Therefore, this paper includes a survey from three aspects such as IoT market opportunities with security challenges, recently identified threats, vulnerabilities, and attacks on IoT with proposed solutions, and the importance of modern technologies such as machine learning, cloud computing, fog computing, edge computing and, blockchain for IoT security solutions. The main contribution of this work is to provide insights into IoT security challenges from various aspects like device and sensor based, software - application based, communication channel based, and future predictions.