АНАЛІЗ ЗАГРОЗ БЕЗПЕКИ ПРИСТРОЇВ ТА ПОСЛУГ ІНТЕРНЕТУ РЕЧЕЙ
Ключові слова:
Інтернет речей, безпека, загрозиАнотація
Analysis of security threats to Internet of Things devices and services
The main weaknesses in building the Internet of Things were identified by analyzing major technology threats and providing recommendations (comprehensive security measures) to improve the security of Internet of Things devices and services.
Посилання
Интернет вещей, IoT, M2M (мировой_рынок). – Електронний ресурс. – Режим доступу: http://www.tadviser.ru/index.php/Статья:Интернет_вещей,_IoT,_M2M_(мировой_рынок).
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges”.
M. Abomhara and G. Koien, “Security and privacy in the internet of things: Current status and open issues”.
D. Watts, “Security and vulnerability in electric power systems”.
D. G. Padmavathi, M. Shanmugapriya et al., “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” arXiv preprint arXiv:0909.0576, 2009.
H. G. Brauch, “Concepts of security threats, challenges, vulnerabilities and risks,” in Coping with Global Environmental Change, Disasters and Security. Springer, 2011, pp. 61–106.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2020 Катерина Володимирівна Піхота, Ірина Віталіївна Кононова
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.