Ontology type: schema:ScholarlyArticle
2019-03
AUTHORSNatalia Miloslavskaya, Alexander Tolstoy
ABSTRACTKeeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for the IoT. Due to multiple vulnerabilities in the IoT foundations, many targeted attacks are continuing to evolve. This survey of related work in the very specialized field of IS assurance for the IoT develops a taxonomy of typical attacks against IoT assets (with special attention to IoT device protection). Based on this taxonomy, the key directions for countering these attacks are defined. According to the modern demand for the IoT and big IS-related data processing, we propose applying the Security Intelligence approach. The results obtained, when compared with the related work and numerous analogues, are based on the following research methodology: view the IoT as a security object to be protected, leading to understanding its vulnerabilities and possible attacks against the IoT exploiting these vulnerabilities, and from there approaches to protecting the IoT. A few areas of the future research, among which the IoT operational resilience and usage of the blockchain technology seem to us the most interesting, are indicated. More... »
PAGES103-119
http://scigraph.springernature.com/pub.10.1007/s10586-018-2823-6
DOIhttp://dx.doi.org/10.1007/s10586-018-2823-6
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1105774799
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Moscow Engineering Physics Institute",
"id": "https://www.grid.ac/institutes/grid.183446.c",
"name": [
"National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 31 Kashirskoye Shosse, 115409, Moscow, Russia"
],
"type": "Organization"
},
"familyName": "Miloslavskaya",
"givenName": "Natalia",
"id": "sg:person.010064431332.08",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010064431332.08"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Moscow Engineering Physics Institute",
"id": "https://www.grid.ac/institutes/grid.183446.c",
"name": [
"National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 31 Kashirskoye Shosse, 115409, Moscow, Russia"
],
"type": "Organization"
},
"familyName": "Tolstoy",
"givenName": "Alexander",
"id": "sg:person.015234226147.55",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234226147.55"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.18535/ijecs/v6i5.41",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085800609"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-58553-6_14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1086843607",
"https://doi.org/10.1007/978-3-319-58553-6_14"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.14569/ijacsa.2017.080650",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1090507754"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/msp.2017.3681066",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1092079425"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/ccnc.2017.7983271",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093256915"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.23919/mipro.2017.7973624",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093371464"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/i-smac.2017.8058363",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094233737"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/w-ficloud.2016.31",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094912118"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/ficloud.2015.12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095570983"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1201/b19516",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095905739"
],
"type": "CreativeWork"
}
],
"datePublished": "2019-03",
"datePublishedReg": "2019-03-01",
"description": "Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for the IoT. Due to multiple vulnerabilities in the IoT foundations, many targeted attacks are continuing to evolve. This survey of related work in the very specialized field of IS assurance for the IoT develops a taxonomy of typical attacks against IoT assets (with special attention to IoT device protection). Based on this taxonomy, the key directions for countering these attacks are defined. According to the modern demand for the IoT and big IS-related data processing, we propose applying the Security Intelligence approach. The results obtained, when compared with the related work and numerous analogues, are based on the following research methodology: view the IoT as a security object to be protected, leading to understanding its vulnerabilities and possible attacks against the IoT exploiting these vulnerabilities, and from there approaches to protecting the IoT. A few areas of the future research, among which the IoT operational resilience and usage of the blockchain technology seem to us the most interesting, are indicated.",
"genre": "research_article",
"id": "sg:pub.10.1007/s10586-018-2823-6",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1046649",
"issn": [
"1386-7857",
"1573-7543"
],
"name": "Cluster Computing",
"type": "Periodical"
},
{
"issueNumber": "1",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "22"
}
],
"name": "Internet of Things: information security challenges and solutions",
"pagination": "103-119",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"695b71b59cd74d8d7855423d0214bee36a0a1a677dfca10fc5baa805285d782b"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s10586-018-2823-6"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1105774799"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s10586-018-2823-6",
"https://app.dimensions.ai/details/publication/pub.1105774799"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T10:17",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000348_0000000348/records_54307_00000001.jsonl",
"type": "ScholarlyArticle",
"url": "https://link.springer.com/10.1007%2Fs10586-018-2823-6"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10586-018-2823-6'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10586-018-2823-6'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10586-018-2823-6'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10586-018-2823-6'
This table displays all metadata directly associated to this object as RDF triples.
99 TRIPLES
21 PREDICATES
37 URIs
19 LITERALS
7 BLANK NODES