IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma

Nesnelerin İnterneti (IoT) makine ve cihazların her yerde ve her zaman internet üzerinden birbirleriyle bağlantılı ve etkileşimli olduğu, hızla gelişmekte olan göz alıcı bir teknolojidir. Şehir yönetiminden akıllı binalara, sağlık sektöründen sanayiye, enerjiden tarıma vb. birçok alanda avantajlar, kolaylıklar ve verimlilik sağlayan bu teknoloji, güvenlik açısından da birçok zorluğu beraberinde getirmiştir. IoT, kaynak kısıtlamaları, çeşitlilik, standardizasyon eksikliği, mobilite, mimari vb. nedenlerden kaynaklanan zorluklardan dolayı çeşitli saldırılara, arızalara ve kötüye kullanıma açıktır. Bu makalede, IoT siber güvenlik sorunları açısından en son ve en gelişmiş fikirleri sunuyoruz. IoT güvenliği açısından tehditleri, güvenlik açıkları ve önlemleri içeren bir karşılaştırma sağlıyoruz. Birçok siber güvenlik sorunu için tedbirler ve önlemler konusunda bazı öneriler veriyoruz.

A Survey on Security Threats and Solutions in the Age of IoT

Internet of Things (IoT) is rapidly developing and glamorous technology in which machines and devices are connected and interactedwith each other via Internet anywhere anytime. This technology, which brings advantages, facilities and efficiency in many areas fromcity management to smart buildings, from health-care to industry, from energy to agriculture, etc. has also brought numerouschallenges in terms of security. IoT is vulnerable to various types of attacks, malfunctions and misuses due to these challengesreasoning such as resource limitations, heterogeneity, lack of standardization, mobility, architecture. In this paper, we present the stateof art for cyber security issues in IoT. We provide a comparison for IoT security in different perspectives including threats,vulnerabilities and some countermeasures. We give some recommendations on the precautions and countermeasures for cyber securityissues in IoT.

___

  • [1] Stergiou, C., Psannis, K.E., Kim, B.,Gupta, B., (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78, 964–975.
  • [2] Khan, M.A., Salah, K., (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
  • [3]Panetta, K. (03.11.2017). Gartner Top Strategic Predictions for 2018 and Beyond. Retrieved from https://www.gartner.com/smarterwithgartner/gartner-top-strategic-predictions- for-2018-and-beyond/), on (02.11.2018).
  • [4] Sfar, A.R., Natalizio E., Challal, Y., Chtourou, Z., (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4, 118–137.
  • [5] ˇColakovi ´c, A., Hadžiali ´c, M., (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.
  • [6] Jaychand, Behar N., (2017). A Survey on IoT Security Threats and Solutions. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 3.
  • [7] Kouicem, D.E., Bouabdallah, A., Lakhlef, H., (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.
  • [8] Ülker, M., Canbay, Y. Sağıroğlu, Ş., (2017). Examination of Internet of Things in Terms of Personal, Enterprise and National Information Security. Journal of Turkey Informatics Foundation of Computer Science and Engineering, 10.
  • [9] Xu, L.D., Li, S., (2017). Securing the Internet of Things. Syngress.
  • [10] Conti, M., Dehghantanha, A., Franke, K., Watson, S., (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78 544–546.
  • [11] Noor, M.M., Hassan,W.H., (2018). Current research on Internet of Things (IoT) security: A survey. Computer Networks.
  • [12] Zhang, J., Duong, T., Woods, R., Marshall, A., (2017). Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy, 19, 420.
  • [13]Rayome, A.D. (21.03.2018). As IoT attacks increase 600% in one year, businesses need to up their security. Retrieved from ( https://www.techrepublic.com/article/as-iot-attacks-increase-600-in-one-year-businesses-need-to-up-their-security/), on (26.09.2018)
  • [14] Denial-of-Service Attack (DoS). Retrieved from (https://www.techopedia.com/definition/24841/denial-of-service-attack-dos), on (02.11.2018)
  • [15] What is a DDoS Attack . Retrieved from (https://www.cloudflare.com/learning/ddos/what-is-a-ddosattack/), on (03.11.2018).
  • [16] What is Malicious Code?. Retrieved from ( https://www.kaspersky.com/resource-center/definitions/malicious-code), on (03.11.2018).
  • [17] Eavesdropping. Retrieved from (https://www.techopedia.com/definition/13612/eavesdropping), on (03.11.2018).
  • [18] What is a Smurf Attack?. Retrieved from (https://usa.kaspersky.com/resource-center/definitions/smurf-attack), on (04.11.2018).
  • [19] Spoofing. Retrieved from (https://www.techopedia.com/definition/5398/spoofing), on (07.11.2018)
  • [20] Riahi, A., Natalizio, E., (2014). A systemic and cognitive approach for IoT security. International Conference on Computing, Networking and Communications.
  • [21] Cha, S., Baek, S., Kang, S., Kim, S., (2018). Security Evaluation Framework for Military IoT Devices. Security and Communication Networks, Volume 2018, Article ID 6135845,12 Pages.
  • [22] Cvitić, I., Vujić, M., Husnjak, S., (October 2015). Classification of Security Risks in the IoT Environment. 26th Daaam International Symposium On Intelligent Manufacturing And Automation.
  • [23] Kumar, S.A., Vealey, T., Srivastava, H., (2016). Security in Internet of Things: Challenges, Solutions and Future Directions. 49th Hawaii International Conference on System Sciences.
  • [24] Alabaa, F.A., Othmana, M., Hashema, I.A.T., Alotaibib, F., (2017). Internet of Things security: A survey, Journal of Network and Computer Applications, 88, 10-28.
  • [25] How to Overcome IoT Security Concerns, (May,2017). A report in the IoT. InfoBrief Series, Sponsored by Bell.
  • [26] Sedrati, A., Mezrioui, A., (2018). A Survey of Security Challenges in Internet of Things. Advances in Science, Technology and Engineering Systems Journal Vol. 3, No. 1, 274-280.
  • [27] Gündüz, M.Z., Daş, R., (2018). Internet of things (IoT): Evolution, components and application fields. Pamukkale University Journal of Engineering Sciences, 24(2), 327-335.
  • [28] Internet of Things Top Ten. Retrieved from https://www.owasp.org/images/7/71/Internet_of_Things_Top_Ten_2014- OWASP.pdf), on (25.09.2018)
Avrupa Bilim ve Teknoloji Dergisi-Cover
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 2013
  • Yayıncı: Osman Sağdıç