ارائه چارچوبی برای ارتقاء امنیت خانههای هوشمند مبتنی بر اینترنت اشیاء با استفاده از معماری مرجع IoT-A
محورهای موضوعی : عمومى
1 - -
2 - کارمند
کلید واژه: تابع ابیراهی فاز, خطای خروج از مرکز تصویر, چندجملهای زرنیک, چندجملهای چبیشف, آنالیز چندطیفی,
چکیده مقاله :
امروزه خانه هوشمند بهعنوان یکی از کاربردهای اصلی و رو به رشد اینترنت اشیاء محسوب میشود که راحتی، امنیت، کاهش مصرف انرژی و هزینههای زندگی را به همراه دارد. در کنار مزایا و محاسنی که این فنّاوری به ارمغان آورده است مسئله امنیت و حریم خصوصی به یکی از نگرانیهای عمده تبدیلشده است که نیاز به توجه جدی دارد. معماری مرجع IoT-A باهدف بررسی پروتکلها و منابع موجود، حصول اطمینان از سازگاری اشیاء و پروتکلهای ارتباطی و همچنین ارائه راهکاری جامع برای کاربردهای مختلف اینترنت اشیا پایهگذاری شده است. این مقاله باهدف قرار دادن چالش امنیت در اینترنت اشیا و خانههای هوشمند، با استفاده از معماری مرجع IoT-A سعی در ارائه یک چارچوب کلی جهت بهبود امنیت در کلیه سطوح طراحی، اجرا و استفاده از تجهیزات و پروتکلها دارد. در این مقاله از اصطلاح چارچوب امنیتی برای شناسایی مجموعه فناوریها، سازوکارها، نرمافزارها و مؤلفههای موردنیاز برای تأمین مجموعهای از نیازهای امنیتی استفادهشده است. این مقاله پس از بررسی و نگاشت آسیبپذیریها و تهدیدات در مدل کاربردی معماری، یک چارچوب امنیتی بهبودیافته نسبت به چارچوب استاندارد معماری مرجع ارائه میکند. بر اساس ارزیابی نظری انجامشده، چارچوب جدید که با اضافه شدن دو مؤلفه مدیریت تهدیدات و آسیبپذیریها و مدیریت زمینه و انجام برخی تغییرات در مؤلفه صدور مجوز شکلگرفته، الزامات امنیتی خانهی هوشمند را تا حد قابل قبولی برآورده کرده و به میزان مناسبی درجه امنیت و حفظ حریم خصوصی خانه هوشمند مبتنی بر معماری اینترنت اشیاء IoT-A را ارتقاء میبخشد.
Today, the smart home is one of the main and growing applications of the Internet of Things, which brings comfort, security, reduced energy consumption and cost of living. In addition to the benefits and advantages that this technology has brought, the issue of security and privacy has become one of the major concerns that needs serious attention. The IoT-A reference architecture is based on examining existing protocols and resources, ensuring the compatibility of objects and communication protocols, and providing a comprehensive solution for various IoT applications. This paper seeks to provide a general framework for improving security at all levels of design, implementation, and use of equipment and protocols, using the IoT-A reference architecture to address the security challenge of the Internet of Things and smart homes. In this article, the term security framework is used to identify the set of technologies, mechanisms, software and components needed to provide a set of security needs. After examining and mapping vulnerabilities and threats in the architectural application model, this paper presents an improved security framework compared to the standard reference architecture framework. Based on the theoretical evaluation, the new framework, which was formed by adding two components of threat and vulnerability management and field management and making some changes in the licensing component, meets the security requirements of the smart home to an acceptable level and provides an appropriate degree of security and protection. Enhances IoT-A-based smart home privacy.
1. J. Zheng, C.D.S.R. Bisdikian, H. Mouftah, The internet of Things, IEEE Communications Magazine, 49(11) (2011) 30-31.
2. T. Fan, Y. Chen, A scheme of data management in the Internet of Things, in: 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content, IEEE, 2010, pp. 110-114.
3. Y. Yu, J. Wang, G. Zhou, The exploration in the education of professionals in applied internet of things engineering, in: 2010 4th International Conference on Distance Learning and Education, IEEE, 2010, pp. 74-77.
4. Y. Huang, G. Li, Descriptive models for Internet of Things, in: Paper presented at the Intelligent Control and Information Processing (ICICIP), 2010 International Conference on, 2010.
5. K. Ashton, That ‘internet of things’ thing, RFID journal, 22(7) (2009) 97-114.
6. G.T. Ferguson, Have your objects call my objects, Harvard business review, 80(6) (2002) 138-144.
7. L. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Computer networks, 54(15) (2010) 2787-2805.
8. G. Lawton, Machine-to-machine technology gears up for growth, computer, (9) (2004) 12-15.
9. A. Gandomi, M. Haider, Beyond the hype: Big data concepts, methods, and analytics, International journal of information management, 35(2) (2015) 137-144.
10. S. Zhang, S. Zhang, X. Chen, X. Huo, . Cloud computing research and development trend, in: Paper presented at the Future Networks. ICFN'10. Second International Conference on., 2010.
11. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE communications surveys & tutorials, 17(4) (2015) 2347-2376.
12. A.K. Sangaiah, G. Li, A joint resource-aware and medical data security framework for wearable healthcare systems, Future Generation Computer Systems, 95 (2019) 382-391.
13. D. Vinodhan, A. Vinnarasi, IOT Based Smart Home, International Journal of Engineering and Innovative Technology (IJEIT), 10 (2016).
14. M. O’Neill, Insecurity by design: Today’s IoT device security problem, Engineering, 21(1) (2016) 48-49.
15. Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, D. Qiu, Security of the Internet of Things: perspectives and challenges, Wireless Networks, 20(8) (2014) 2481-2501.
16. E. Nimmermark, A. Larsson, Comparison of IoT frameworks for the smart home, (2016).
17. G. Lobaccaro, S. Carlucci, E. Löfström, A review of systems and technologies for smart homes and smart grids, Energies, 9(5) (2016) 348.
18.H.K. Jonnalagadda, Secure Communication Scheme in Smart Home Environment, (2016).
19.F. Johari, The security of communication protocols used for Internet of Things, LU-CS-EX 2015-42, (2015).
20.F. Kausar, E. Al Eisa, I. Bakhsh, Intelligent home monitoring using RSSI in wireless sensor networks, International Journal of Computer Networks &
Communications, 4(6) (2012) 33. 21.S. Marzano, The new everyday: Views on ambient intelligence, 010 Publ., 2003.
22.A. Saad al-sumaiti, M.H. Ahmed, M.M. Salama, Smart home activities: A literature review, Electric Power Components and Systems, 42(3-4) (2014) 294-305.
23.W. Granzer, W. Kastner, G. Neugschwandtner, F. Praus, A modular architecture for building automation systems, na, 2006.
24.M.A. Al-Qutayri, J.S. Jeedella, Integrated wireless technologies for smart homes applications, in: Smart Home Systems, IntechOpen, 2010.
25.B.L.R. Stojkoska, K.V. Trivodaliev, A review of Internet of Things for smart home: Challenges and solutions, Journal of Cleaner Production, 140 (2017) 1454-1464.
26.T. Heer, O. Garcia-Morchon, R. Hummen, S.L. Keoh, S.S. Kumar, K. Wehrle, Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, 61(3) (2011) 527-542.
27.G. Gan, Z. Lu, J. Jiang, Internet of things security analysis, in: 2011 international conference on internet technology and applications, IEEE, 2011, pp. 1-4. 28.M. Katagi, S. Moriai, Lightweight cryptography for the internet of things, Sony Corporation, (2008) 7-10.
29.S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for internet of things (iot), in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), IEEE, 2011, pp. 1-5.
30.R. Roman, P. Najera, J. Lopez, Securing the internet of things, Computer, (9) (2011) 51-58.
31.M.M. Hossain, M. Fotouhi, R. Hasan, Towards an analysis of security issues, challenges, and open problems in the internet of things, in: 2015 IEEE World Congress on Services, IEEE, 2015, pp. 21-28.
32.P. Sarigiannidis, E. Karapistoli, A.A. Economides, VisIoT: A threat visualisation tool for IoT systems security, in: 2015 IEEE International Conference on Communication Workshop (ICCW), IEEE, 2015, pp. 2633-2638.
33.H. Lin, N. Bergmann, IoT privacy and security challenges for smart home environments, Information, 7(3) (2016) 44.
34.Z.A. Almusaylim, N. Zaman, A review on smart home present state and challenges: linked to context-awareness internet of things (IoT), Wireless Networks, 25(6) (2019) 3193-3204.
35.I. Lee, K. Lee, The Internet of Things (IoT): Applications, investments, and challenges for enterprises, Business Horizons, 58(4) (2015) 431-440.
36.J. Bugeja, A. Jacobsson, P. Davidsson, On privacy and security challenges in smart connected homes, in: 2016 European Intelligence and Security Informatics Conference (EISIC), IEEE, 2016, pp. 172-175.
37.S.C. Mukhopadhyay, N. Suryadevara, Internet of things: Challenges and opportunities. In Internet of Things (pp. 1-17), Springer, 2014. 38.M. Younas, Research challenges of big data, (2019).
39.O. Olayemi, V. Antti, H. Keijo, T. Pekka, Security issues in smart homes and mobile health system: threat analysis, possible countermeasures and lessons learned, (2017).
40.R. Billure, V.M. Tayur, V. Mahesh, Internet of Things-a study on the security challenges, in: 2015 IEEE International Advance Computing Conference (IACC), IEEE, 2015, pp. 247-252.
41.A. Riahi, E. Natalizio, Y. Challal, N. Mitton, A. Iera, A systemic and cognitive approach for IoT security, in: 2014 International Conference on Computing, Networking and Communications (ICNC), IEEE, 2014, pp. 183-188.
42.C. Lee, L. Zappaterra, K. Choi, H.-A. Choi, Securing smart home: Technologies, security challenges, and security requirements, in: 2014 IEEE Conference on Communications and Network Security, IEEE, 2014, pp. 67-72.
43.H.A. Abdul-Ghani, D. Konstantas, A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective, Journal of Sensor and Actuator Networks, 8(2) (2019) 22.
44.D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, G. Baldini, Security and privacy issues for an IoT based smart home, in: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, 2017, pp. 1292-1297.
45.M. Dabbagh, A. Rayes, Internet of things security and privacy, in: Internet of Things From Hype to Reality, Springer, 2019, pp. 211-238.
46.I. Yaqoob, E. Ahmed, M.H. ur Rehman, A.I.A. Ahmed, M.A. Al-garadi, M. Imran, M. Guizani, The rise of ransomware and emerging security challenges in the Internet of Things, Computer Networks, 129 (2017) 444-458.
47.T. Bhattasali, R. Chaki, N. Chaki, Study of security issues in pervasive environment of next generation internet of things, in: IFIP International Conference on Computer Information Systems and Industrial Management, Management, Springer, 2013, pp. 206-217.
48.P. Fremantle, A reference architecture for the internet of things, WSO2 White paper, (2014).
49.S. Chen, H. Xu, D. Liu, B. Hu, H. Wang, A vision of IoT: Applications, challenges, and opportunities with china perspective, IEEE Internet of Things journal, 1(4) (2014) 349-359.
50.I. FhG, S.H. SAP, E.H. HSG, C. Jardak, A.O. CEA, A. Serbanati, J.W. Walewski, Internet of things-architecture iot-a deliverable d1. 3–updated reference model for iot v1. 5 (2012).
51.A. Torkaman, M.A. Seyyedi, Analyzing IoT reference architecture models, International Journal of Computer Science and Software Engineering, 5(8) (2016) 154.
52.J.L. Hernández-Ramos, M.V. Moreno, J.B. Bernabé, D.G. Carrillo, A.F. Skarmeta, SAFIR: Secure access framework for IoT-enabled services on smart
buildings, Journal of Computer and System Sciences, 81(8) (2015) 1452-1463 53.N. Miloslavskaya, A. Tolstoy, New SIEM System for the Internet of Things, in: In World Conference on Information Systems and Technologies (pp. 317-327) Springer, Cham. April., 2019.