Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri
{"title":"物联网中安全组件布局优化调查","authors":"Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri","doi":"10.1007/s10922-024-09852-6","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"5 1","pages":""},"PeriodicalIF":4.1000,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey on the Optimization of Security Components Placement in Internet of Things\",\"authors\":\"Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri\",\"doi\":\"10.1007/s10922-024-09852-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.</p>\",\"PeriodicalId\":50119,\"journal\":{\"name\":\"Journal of Network and Systems Management\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2024-08-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Network and Systems Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s10922-024-09852-6\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Systems Management","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10922-024-09852-6","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A Survey on the Optimization of Security Components Placement in Internet of Things
The Internet of Things (IoT) environment has become the basic channel for the propagation of Distributed Denial of Service (DDoS) and malware intrusions. Cyber threats in IoT require new mechanisms and strategies to secure devices during their life cycle. These threats are real for operators and manufacturers of connected objects. Less and uncorrected secure devices are priority objectives for botnet operators to capture and obtain testing devices. In this article, we reviewed the problem of optimizing the placement of security components in IoT. We provide a generic view of the placement of security components at different levels in the IoT. First, we present an overview of IoT. Then, we conduct a demonstration and a thematic classification of numerous solutions for the placement of security components in the IoT. Thus, this presentation will be followed by a discussion of diverse research questions and a set of proposals for various future orientations of this domain to advance the problem resolution in this research article.
期刊介绍:
Journal of Network and Systems Management, features peer-reviewed original research, as well as case studies in the fields of network and system management. The journal regularly disseminates significant new information on both the telecommunications and computing aspects of these fields, as well as their evolution and emerging integration. This outstanding quarterly covers architecture, analysis, design, software, standards, and migration issues related to the operation, management, and control of distributed systems and communication networks for voice, data, video, and networked computing.