ИССЛЕДОВАНИЕ МЕТОДОВ АУТЕНТИФИКАЦИИ В ПРОМЫШЛЕННОМ ИНТЕРНЕТЕ ВЕЩЕЙ
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. Gartner Expert Glossary. 2022. URL: https://www.gartner.com/en/information-technology/glossary/internet-of-things (дата обращения: 18.11.2022).
2. Malik N. et al. A comprehensive review of blockchain applications in industrial Internet of Things and supply chain systems. Applied Stochastic Models in Business and Industry. 2021.
DOI: https://doi.org/10.1002/asmb.2621.
3. Экосистема индустриального интернета России. Исследование. РАЭК. Ростелеком. 2017.
URL: https://raec.ru/activity/analytics/9847 (дата обращения: 18.11.2022).
4. Mamdouh M. et al. Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. Computers & Security. 2021, vol. 111, p. 102491.
DOI: https://doi.org/10.1016/j.cose.2021.102491.
5. Zhao Q. et al. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management. 2020, vol. 57, no. 6, p. 102355.
DOI: https://doi.org/10.1016/j.ipm.2020.102355.
6. IoT Барометр МТС. 2021. URL: http://i.content-review.com/s/2b3d9e83b5d522145afd58b0909c1078.pdf (дата обращения: 18.11.2022).
7. Yang K., Blaauw D. and Sylvester D. Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey. IEEE Micro, vol. 37, no. 6, p. 72–89, November/December 2017.
DOI: https://doi.org/10.1109/MM.2017.4241357.
8. Capellupo M., Liranzo J., Bhuiyan M.Z.A., Hayajneh T., Wang G. Security and Attack Vector Analysis of IoT Devices. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(). Springer, Cham. 2017, vol 10658, p. 593–606. DOI: https://doi.org/10.1007/978-3-319-72395-2_54.
9. Tianlong Yu, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. 2015. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets-XIV). Association for Computing Machinery, New York, NY, USA, Article 5, 1–7.
DOI: https://doi.org/10.1145/2834050.2834095.
10. Ulf Lindqvist and Peter G. Neumann. 2017. The future of the internet of things. Commun. ACM 60, 2 (February 2017), p. 26–30. DOI: https://doi.org/10.1145/3029589.
11. Marzano A. et al. The Evolution of Bashlite and Mirai IoT Botnets. IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil. 2018, p. 00813–00818.
DOI: https://doi.org/10.1109/ISCC.2018.8538636.
12. Manos Antonakakis et al. Understanding the Mirai botnet. 26th USENIX Security Symposium August 16–18, 2017. Vancouver, BC, Canada. 2017, p. 1093–1110.
URL: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf (дата обращения: 18.11.2022).
13. Serror M., Hack S., Henze M., Schuba M. and Wehrle K. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Transactions on Industrial Informatics. May 2021, vol. 17, no. 5, p. 2985–2996.
DOI: https://doi.org/10.1109/TII.2020.3023507.
14. Liu J., Xiao Y. and Chen C. L. P. Authentication and Access Control in the Internet of Things. 32nd International Conference on Distributed Computing Systems Workshops, Macau, China. 2012, p. 588–592.
DOI: https://doi.org/10.1109/ICDCSW.2012.23.
15. Babar S., Mahalle P., Stango A., Prasa N., Prasad, R. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science. Springer, Berlin, Heidelberg. Vol. 89, p. 420–429.
DOI: https://doi.org/10.1007/978-3-642-14478-3_422010.
16. Saifullah A., Xu Y., Lu C. and Chen Y. Real-Time Scheduling for WirelessHART Networks. 31st IEEE Real-Time Systems Symposium, San Diego, CA, USA. 2010, p. 150–159.
DOI: https://doi.org/10.1109/RTSS.2010.41.
17. Dirgantoro K.P., Nwadiugwu W.P., Lee J.M., Kim D.S. Dual fieldbus industrial IoT networks using edge server architecture. Manuf. Lett. 2020, 24, p. 108–112.
DOI: https://doi.org/10.1016/j.mfglet.2020.04.006.
18. Devan P., Hussin F.A., Ibrahim R., Bingi K., Khanday F.A. A Survey on the Application of WirelessHART for Industrial Process Monitoring and Control. Sensors vol. 21, 2021.
DOI: https://doi.org/10.3390/s21154951.
19. Sisinni E., Saifullah A., Han S., Jennehag U. and Gidlund M. Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Transactions on Industrial Informatics. Nov. 2018, vol. 14, no. 11,
p. 4724–4734. DOI: https://doi.org/10.1109/TII.2018.2852491.
20. Jayalaxmi P., Saha R., Kumar G., Kumar N. and Kim T.-H. A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access. 2021, vol. 9, p. 25344–25359. DOI: https://doi.org/10.1109/ACCESS.2021.3057766.
21. Panchal A.C., Khadse V.M. and Mahalle P.N. Security Issues in IIoT: A Comprehensive Survey of Attacks on IIoT and Its Countermeasures. IEEE Global Conference on Wireless Computing and Networking (GCWCN), Lonavala, India. 2018, p. 124–130.
DOI: https://doi.org/10.1109/GCWCN.2018.8668630.
22. Pal S., Jadidi Z. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things. Applied Sciences. 2021, vol.11(20).
DOI: https://doi.org/10.3390/app11209393.
23. Pal S., Hitchens M. and Varadharajan V. Modeling Identity for the Internet of Things: Survey, Classification and Trends. 12th International Conference on Sensing Technology (ICST), Limerick, Ireland. 2018, p. 45–51.
DOI: https://doi.org/10.1109/ICSensT.2018.8603595.
24. Mahalle P., Babar S., Prasad N.R., Prasad R. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science. Springer, Berlin, Heidelberg. Vol. 89, p. 430–439. DOI: https://doi.org/10.1007/978-3-642-14478-3_432010.
25. Финогеев А. Маршрутизация и защита данных в беспроводных сенсорных сетях. Lambert Academic Publishing, 2016. – 96 c. URL: https://www.lap-publishing.com/catalog/details/store/ru/book/978-3-659-91987-9/маршрутизация-и-защита-данных-в-беспроводных-сенсорных-сетях?locale=ru (дата обращения: 18.11.2022).
26. Kara M. and Furat M. Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT Devices. Balkan Journal of Electrical and Computer Engineering. 2018, vol. 6, no. 2, p. 88–93.
DOI: https://doi.org/10.17694/bajece.419546.
27. Sicari S., Rizzardi A., Grieco L.A., Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead. Computer Network. 2015, vol. 76, p. 146–164.
DOI: https://doi.org/10.1016/j.comnet.2014.11.008.
28. Ho G., Leung D., Mishra P., Hosseini A., Song D., Wagner D. Smart Locks: Lessons for Securing Commodity Internet of Things Devices. In Proceedings of the 11th Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016, p. 461–472. DOI: https://doi.org/10.1145/2897845.2897886.
29. Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, and Lei Shu. Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks. Hindawi. 2017.URL: https://www.researchgate.net/publication/311808641_Authentication_Protocols_for_Internet_of_Things_A_Comprehensive_Survey (дата обращения: 18.11.2022).
30. Lai C., Lu R., Zheng D., Li H., and Sherman X. GLARM: group-based lightweight authentication scheme for resourceconstrained machine to machine communications. Computer Networks. 2016, vol. 99, p. 66–81.
31. Chan A.C.-F. and Zhou J. Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem. IEEE Journal on Selected Areas in Communications. July 2014, vol. 32, no. 7, p. 1509–1517.
DOI: https://doi.org/10.1109/JSAC.2014.2332121.
32. Chim T.W., Yiu S.M., Hui L.C.K. and Li V.O.K. PASS: Privacy-preserving authentication scheme for smart grid network. IEEE 2nd International Conference on Smart Grid Communications, SmartGridComm. 2011,
p. 196–201.
DOI: https://doi.org/10.1109/SmartGridComm.2011.6102316.
33. Chang C.-C. and Le H.-D. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE Transactions on Wireless Communications. 2016, vol. 15, no. 1, p. 357–366.
DOI: https://doi.org/10.1109/TWC.2015.2473165.
34. Merkle tree. EU General Data Protection Regulation. 2020. URL: https://en.bitcoinwiki.org/wiki/Merkle_tree (дата обращения: 18.11.2022).
35. Marko Vukolić. Rethinking Permissioned Blockchains. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts (BCC '17). Association for Computing Machinery, New York, NY, USA. 2017, p. 3–7.
DOI: https://doi.org/10.1145/3055518.3055526.
36. Ethereum Homestead Documentation. Online. Ethereum community. 2016.
URL: http://www.ethdocs.org/en/latest/index.html (дата обращения: 18.11.2022).
37. Arachchige P.C.M., Bertok P., Khalil I., Liu D., Camtepe S. and Atiquzzaman M. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Transactions on Industrial Informatics. Sept. 2020, vol. 16, no. 9, p. 6092–6102.
DOI: https://doi.org/10.1109/TII.2020.2974555.
38. Hammi M.T., Bellot P. and Serhrouchni A. BCTrust: A decentralized authentication blockchain-based mechanism. IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain. 2018,
p. 1–6. DOI: https://doi.org/10.1109/WCNC.2018.8376948.
39. Johnson D., Menezes A. & Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). IJIS 1,
36–63 (2001). DOI: https://doi.org/10.1007/s102070100002.
40. Conner Fromknecht, Dragos Velicanu, and Sophia Yakoubov. CertCoin: A NameCoin Based Decentralized Authentication System. 2014. URL: https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf (дата обращения: 18.11.2022).
DOI: http://dx.doi.org/10.26583/bit.2023.1.03
Ссылки
- На текущий момент ссылки отсутствуют.
Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.