PADRÕES DE SEGURANÇA PARA DISPOSITIVOS IOT LOW-END: UMA REVISÃO COMPARATIVA

Autores

DOI:

https://doi.org/10.47820/recima21.v4i1.2437

Palavras-chave:

Internet das coisas, Segurança

Resumo

A Internet das coisas permite que pessoas e objetos estejam conectados a qualquer momento, em qualquer lugar, com qualquer objeto a qualquer pessoa, usando qualquer caminho/rede e qualquer serviço. Assim, leva a uma heterogeneidade desafiadora de componentes e redes. Diferentes sistemas operacionais foram desenvolvidos para dispositivos IoT de baixo custo com requisitos rigorosos impostos principalmente pela baixa capacidade de processar e armazenar informações em comparação com uma máquina convencional. Assim, o sistema operacional deve ser capaz de executar tarefas da forma mais eficiente possível. Em redes heterogêneas, como no caso da IoT, é mais complexo garantir a segurança e a privacidade dos sistemas que fazem parte desse ecossistema. A funcionalidade principal da IoT é baseada na troca de informações entre centenas ou até milhões de objetos com a Internet. Este trabalho realiza uma revisão comparativa dos principais recursos de segurança disponíveis em sistemas operacionais de baixo custo orientados para IoT, incluindo Contiki, RIOT-OS, TinyOS e FreeRTOS.

Downloads

Os dados de download ainda não estão disponíveis.

Biografias do Autor

  • Rodrigo Ronner Tertulino da Silva, IFRN

    Student doctoral program at the Department of Informatics and Engineering of the University of Coimbra (UC). Professor at the Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN), Brazil. Master’s degree at the State University of Rio Grande do Norte (UERN), Brazil. Researcher on privacy and security in Healthcare (EHR) systems.

  • Nuno Antunes

    Assistant Professor at the Department of Informatics and Engineering of the University of Coimbra (UC). PhD from UC. Researcher in software security and dependability within the Centre for Informatics and Systems of University of Coimbra (CISUC).

Referências

A. Ouadjaout, A. Miné, N. Lasla, and N. Badache, “Static analysis by abstract interpretation of functional properties of device drivers in TinyOS,” J. Syst. Softw., vol. 120, pp. 114–132, 2016.

A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash, "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications," in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, Fourth quarter 2015. doi: 10.1109/COMST.2015.2444095

A. Hicham, A. Sabri, A. Jeghal, and H. Tairi, “A Comparative Study between Operating Systems for the Internet of Things (IoT),” Trans. Mach. Learn. Artif. Intell., Vol. 5, No. 4, 2017.

Aberbach, Hicham & Abdelouahed, Sabri & Jeghal, Adil & Tairi, H. (2017). A Comparative Study between Operating Systems (Os) for the Internet of Things (IoT). Transactions on Machine Learning and Artificial Intelligence. 5. 10.14738/tmlai.54.3192.

Luigi Atzori, Antonio Iera, Giacomo Morabito, The Internet of Things: A survey, Computer Networks, Volume 54, Issue 15, 2010, Pages 2787-2805, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2010.05.010.

Brian Russell and Drew Van Duren. 2018. Practical Internet of Things Security: Design a Security Framework for an Internet Connected Ecosystem, 2nd Edition (2nd ed.). Packt Publishing.

C. Lévy-Bencheton, E. Darra, G. Tétu, G. Dufay, and M. Alattar, “Security and resilience of smart home environments: Good practices and recommendations,” Eur. Union Agency Netw. Inf. Security, Athens, Greece, Rep., Dec. 2015. Accessed: Jun. 2019. [Online]. Available: https://www.enisa.europa.eu/publications/security-resilience-good-practices. doi: 10.2824/360120.

C. Sabri, L. Kriaa, and S. L. Azzouz, “Comparison of IoT constrained devices operating systems: A survey,” Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. AICCSA, vol. 2017–Octob, pp. 369–375, 2018.

Dener, M. (2014). Security Analysis in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2014/303501

E. Baccelli et al., "RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT," in IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4428-4440, Dec. 2018. doi: 10.1109/JIOT.2018.2815038

Heer, T.; Garcia-Morchon, O.; Hummen, R.; Keoh, S.L.; Kumar, S.S.; Wehrle, K. Security Challenges in the IP-based Internet of Things. Wirel. Person. Commun. 2011, 61, 527–542.

Hoepman J.-H., Jacobs B. Increased security through open source Commun. ACM, 50 (1) (2007), pp. 79-83, doi: http://doi.acm.org/10.1145/1188913.1188921

I. Ishaq et al., “IETF standardization in the field of the Internet of Things (IoT): A survey,” J. Sens. Actuator Netw., vol. 2, pp. 235–287, 2013.

Jsang, A. and Maseng, T. and Knapskog, S.J. Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings LNCS sublibrary: Security and cryptology Volume 5838 de Lecture Notes in Computer Science Security and Cryptology.

Hahm, Oliver et al. “Operating Systems for Low-End Devices in the Internet of Things: A Survey.” IEEE Internet of Things Journal 3 (2016): 720-734. DOI:10.1109/JIOT.2015.2505901

O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, Cluster of European Research Projects on the Internet of Things, CERP-IoT, 2011.

Oliver Hahm, Emmanuel Baccelli, Hauke Petersen, Nicolas Tsiftes. Operating Systems for Low-End Devices in the Internet of Things: A Survey. IEEE Internet of Things Journal, IEEE, 2016, 3 (5), pp.720-734. ff10.1109/JIOT.2015.2505901ff. ffhal-01245551f

Perera, Charith & Liu, Chi Harold & Jayawardena, Srimal & Chen, Min. (2015). A Survey on Internet of Things From Industrial Market Perspective. IEEE ACCESS. 2. 1660-1679. Doi: 10.1109/ACCESS.2015.2389854.

Sha, Kewei, Wei Wei, T. Andrew Yang, Zhiwei Wang, and Weisong Shi. 2018. On security challenges and open issues in Internet of Things. Future Generation Computer Systems-The International Journal of eScience 83: 326–37.

Singh, S., Sharma, P.K., Moon, S.Y. et al. J Ambient Intell Human Comput (2017). https://doi-org.ez139.periodicos.capes.gov.br/10.1007/s12652-017-0494-4

Tan, S. L. and Tran Nguyen, B. A. (2009) ‘Survey and performance evaluation of real-time operating systems (RTOS) for small microcontrollers’, IEEE Micro, pp. 1–14. doi: 10.1109/mm.2009.56. TinyOS Documentation Wiki. http://tinyos.stanford.edu/tinyos-wiki/index.php/TinySec. Accessed: 21/10/2021

Umer, T, Rehmani, MH, Kamal, AE, Mihaylova, L. Information and resource management systems for Internet of Things: energy management, communication protocols and future applications. Future Gener Comput Syst; 2019; 92: 1021‐ 1027.

WolfSSL, State of the art networking security for embedded systems. https://www.freertos.org/FreeRTOS-Plus/WolfSSL/WolfSSL.html. Accessed: 07/07/2021.

Zikria, Yousaf & Kim, Sung & Hahm, Oliver & Afzal, Muhammad & Y Aalsalem, Mohammed. (2019). Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution. Sensors. 8. 1-10. Doi: 10.3390/s1908

Downloads

Publicado

02/01/2023

Como Citar

PADRÕES DE SEGURANÇA PARA DISPOSITIVOS IOT LOW-END: UMA REVISÃO COMPARATIVA. (2023). RECIMA21 -Revista Científica Multidisciplinar - ISSN 2675-6218, 4(1), e412437. https://doi.org/10.47820/recima21.v4i1.2437