通信学报 ›› 2021, Vol. 42 ›› Issue (8): 188-205.doi: 10.11959/j.issn.1000-436x.2021124

• 综述 • 上一篇    下一篇

物联网安全研究综述:威胁、检测与防御

杨毅宇1, 周威1, 赵尚儒1, 刘聪2, 张宇辉3, 王鹤3, 王文杰1, 张玉清1,2,3,4   

  1. 1 中国科学院大学国家计算机网络入侵防范中心,北京 101408
    2 西安邮电大学网络空间安全学院,陕西 西安 710121
    3 西安电子科技大学网络与信息安全学院,陕西 西安 710071
    4 海南大学计算机与网络空间安全学院,海南 海口 570228
  • 修回日期:2021-04-14 出版日期:2021-08-25 发布日期:2021-08-01
  • 作者简介:杨毅宇(1987- ),男,云南大理人,中国科学院大学博士生,主要研究方向为网络与系统安全
    周威(1993- ),男,河北保定人,中国科学院大学博士生,主要研究方向为网络与系统安全
    赵尚儒(1995- ),男,广东广州人,中国科学院大学博士生,主要研究方向为网络与系统安全
    刘聪(1997- ),男,陕西宝鸡人,西安邮电大学硕士生,主要研究方向为网络与系统安全
    张宇辉(1997- ),男,山西临汾人,西安电子科技大学硕士生,主要研究方向为网络与系统安全
    王鹤(1987- ),女,河南滑县人,博士,西安电子科技大学讲师,主要研究方向为网络与系统安全、密码学
    王文杰(1964- ),男,陕西西安人,博士,中国科学院大学副教授,主要研究方向为信息安全与智能信息处理
    张玉清(1966- ),男,陕西西安人,博士,中国科学院大学教授,主要研究方向为网络与系统安全
  • 基金资助:
    国家重点研发计划基金资助项目(2018YFB0804701);国家自然科学基金资助项目(U1836210)

Survey of IoT security research: threats, detection and defense

Yiyu YANG1, Wei ZHOU1, Shangru ZHAO1, Cong LIU2, Yuhui ZHANG3, He WANG3, Wenjie WANG1, Yuqing ZHANG1,2,3,4   

  1. 1 National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China
    2 School of Cyberspace Security, Xi’an University of Posts &Telecommunications, Xi’an 710121, China
    3 School of Cyber Engineering, Xidian University, Xi’an 710071, China
    4 School of Computer Science and Cyberspace Security, Hainan University, Haikou 570228, China
  • Revised:2021-04-14 Online:2021-08-25 Published:2021-08-01
  • Supported by:
    The National Key Research and Development Program of China(2018YFB0804701);The National Natural Science Foundation of China(U1836210)

摘要:

基于近5年网安国际会议(ACM CCS、USENIX Security、NDSS、IEEE S&P)中发表的物联网安全文献,以及其他部分高水平研究工作,从威胁、检测、防御的视角对物联网安全研究工作进行了系统的整理和分析。首先,介绍了物联网系统的基本架构。然后,将当前研究中提出的主要威胁分为8种类型,并分析了威胁的成因和危害。之后,介绍了针对这些威胁所提出的6种威胁检测和5种防御方案,并对比了它们的技术原理和优缺点。最后,提出了当前研究依然面临的主要挑战,并指出了未来研究发展的方向。

关键词: 物联网, 安全, 威胁, 检测, 防御

Abstract:

Based on the IoT security literatures published in the international conferences on network security (ACM CCS, USENIX Security, NDSS, IEEE S&P) in recent five years, and other prominent researches, the works from the perspective of "threat, detection, defense" were systematically summarized and analyzed.Firstly the basic architecture of the IoT system was introduced.Then the main threats proposed in these works were classified into eight categories, and the causes and hazards of the threats were analyzed.After that, six detection and five defense schemes against these threats were introduced, and their technical principles, advantages and disadvantages were compared.At last, on the basis of the above analysis, the main challenges that the current research still faces were put forward, and the research directions of future works were point out.

Key words: IoT, security, threat, detection, defense

中图分类号: 

No Suggested Reading articles found!