دانلود رایگان مقاله طراحی و اجرای بستر آزمون امنیت اینترنت اشیا (IoT) خودکار – سال 2020

 

 


 

مشخصات مقاله:

 


 

عنوان فارسی مقاله:

طراحی و اجرای بستر آزمون امنیت اینترنت اشیا (IoT) خودکار

عنوان انگلیسی مقاله:

Design and implementation of automated IoT security testbed

کلمات کلیدی مقاله:

اینترنت اشیاء، IoT Testbed، ارزیابی آسیب پذیری، تست خودکار، معماری

کلمات کلیدی انگلیسی:

      Internet of Things – IoT Testbed – Vulnerability Assessment – Automated Testbed – Architecture

مناسب برای رشته های دانشگاهی زیر:

مهندسی فناوری اطلاعات

مناسب برای گرایش های دانشگاهی زیر:

اینترنت و شبکه های گسترده

وضعیت مقاله انگلیسی و ترجمه:

مقاله انگلیسی را میتوانید به صورت رایگان با فرمت PDF با کلیک بر روی دکمه آبی، دانلود نمایید. برای ثبت سفارش ترجمه نیز روی دکلمه قرمز رنگ کلیک نمایید. سفارش ترجمه نیازمند زمان بوده و ترجمه این مقاله آماده نمیباشد و پس از اتمام ترجمه، فایل ورد تایپ شده قابل دانلود خواهد بود.

 


 

فهرست مطالب:

Abstract
Keywords
1. Introduction
2. Comprehensive study on IoT security analysis
2.1. IoT vulnerabilities
2.2. Vulnerability mitigation techniques and security testbeds
2.3. Our testbed contribution
3. Testbed requirements, structure and components
3.1. . Testbed structure
3.2. Testbed main components
4. Experimental setup
4.1. Phase 1- extensive analysis phase
4.2. Phase 2- automated testing phase
5. Automated Testbed Implementation and Discussion of Results
5.1. Wireless Camera Assessment
5.2. Smart bulb assessment
6. Conclusion and future research
Funding
Declaration of Competing Interest
Acknowledgments
Appendix
References

 


 

قسمتی از مقاله انگلیسی:

1. Introduction
The Internet of Things (IoT) is a recent evolution in communication technology that is rapidly reshaping our future. This technology enables communication and interaction between small embedded devices, improving the ability of such devices to better serve our needs [1]. In the future, IoT will be a key technological solution for many sectors including health care, agriculture and manufacturing [2], [3]. For example, in the field of health care, IoT can monitor and control human health indicators and rapidly deliver reports and alarms to medical personnel. The application of these devices is saving many lives. According to [4], the total worth of all existing IoT devices is valued at around $6.2 trillion, most of which is deployed in healthcare applications. Moreover, IoT technology is considered to be one of the main components in the up-and-coming trend of smart cities. Many studies have discussed the various uses of IoT in shaping healthier building structures, managing waste, monitoring noise, controlling smart lighting and even relieving traffic [5]. The concept of smart cities is emerging as a result of the perceived benefits to citizens, government and the environment. However, due to the limited capabilities of IoT devices, many of them have vulnerabilities that make them prone to various attacks. A vulnerable IoT device can be a dangerous hole in any network, regardless of its security level [6]. Many attacks have involved leveraging the vulnerabilities of IoT devices, including actions such as replay attacks, zero-day attacks, impersonation attacks and spoofing attacks. An increase in botnet attacks has also been observed.

 


 

دانلود رایگان مقاله انگلیسی

سفارش ترجمه این مقاله

 


 

دیدگاهتان را بنویسید