首页> 外文OA文献 >Security Frameworks for Machine-to-Machine Devices and Networks
【2h】

Security Frameworks for Machine-to-Machine Devices and Networks

机译:机器对机器设备和网络的安全框架

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the “functions and capabilities” of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
机译:在过去的十年中,针对移动系统的攻击不断升级。欺诈,平台攻击和恶意软件的数量有所增加。物联网(IoT)为网络罪犯提供了一种新的攻击媒介。 M2M促进了使用无线系统进行Internet连接的设备数量的增长。创建新的应用程序和平台时,旧的漏洞将转移到下一代系统。当前的安全框架开发方法与对这些新技术如何不同以及如何相似的理解之间存在研究差距。之所以存在这种差距,是因为系统设计人员,安全架构师和用户没有完全意识到安全风险以及下一代设备如何危及安全和个人隐私。用于制定安全性要求的当前技术并未充分考虑使用新技术,这削弱了对策的实施。这些技术依赖于安全框架来进行需求开发。这些框架缺乏识别下一代安全问题的方法以及用于比较,对比和评估非人类设备安全保护的过程。这项研究通过提供新颖的安全框架(针对M2M设备的“功能和功能”的研究)并改善了整个IoT生态系统的系统开发生命周期,提供了针对此问题的解决方案。

著录项

  • 作者

    Demblewski Michael;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号