...
【24h】

Security risk management in IoT environment

机译:IOT环境中的安全风险管理

获取原文
获取原文并翻译 | 示例
           

摘要

The internet of things (IoT) devices envision great usage in military, civilian contexts, smart grids to smart cities and internet of battlefields to internet of vehicles. The digitally connected devices sharing high volume data pervasively imbibe several security and privacy concerns. As various wireless technologies are growing, the IoT devices usage is also growing. The miniaturization revolution has resulted in smart objects era. The IoT devices are resource constrained which follow many challenges of data security. IoT technology utilizes embedded sensors for gathering personal information, which imposes privacy challenges. The research work deals with the identification and mitigation ofthesecurity vulnerabilities by an intelligent and smart software vendor, which enumerates common vulnerabilities in its database and provides the possible solution for mitigating the same. The research puts emphasis on various security and privacy risks, attacks, threats, vulnerabilities, IoT vision, and protocol stack, supporting technologies, architecture and applications areas. The CVE (common vulnerability enumeration) method is employed to identify and mitigate security vulnerabilities. A deep analytical study has been performed for describing IoT vision, protocols, technologies, architecture, applications and security/privacy risks, attacks and threats. The results indicate how the security vulnerability identification helps in prioritizing business decisions by vulnerabilities quantification.We posit the smart vendor potential for IoT software security vulnerability mitigation by querying with the database as per vulnerability identification and making the developers enable for quantification and prioritization of vulnerabilities by providing various levels to them.
机译:东西互联网(物联网)设备设想在军事,民用环境,智能电网到智能城市和战场互联网上的智能城市和车辆互联网上的巨大用法。数字连接的设备共享高卷数据普遍存在的若干安全性和隐私问题。随着各种无线技术的增长,IOT设备的使用也在增长。小型化革命导致智能对象时代。 IOT设备是资源约束,其遵循数据安全性的许多挑战。物联网技术利用嵌入式传感器来收集个人信息,这赋予了隐私挑战。该研究工作涉及智能和智能软件供应商的识别和缓解智能漏洞,该智能软件供应商枚举其数据库中的常见漏洞,并为缓解相同的解决方案提供了可能的解决方案。该研究强调各种安全和隐私风险,攻击,威胁,脆弱性,IAT愿景和协议栈,支持技术,架构和应用领域。 CVE(常见漏洞枚举)方法用于识别和缓解安全漏洞。已经进行了深入的分析研究,用于描述物联网愿景,协议,技术,架构,应用程序和安全/隐私风险,攻击和威胁。结果表明,安全漏洞识别如何通过漏洞提供优先顺序业务决策。我们通过根据漏洞识别使用数据库查询数据库,并使开发人员能够进行漏洞和优先级,以对IoT软件安全漏洞缓解的智能供应商潜在的潜力向他们提供各种级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号