引用本文
  • 郑尧文,文辉,程凯,李红,朱红松,孙利民.物联网安全威胁与安全模型[J].信息安全学报,2023,8(5):81-95    [点击复制]
  • ZHENG Yaowen,WEN Hui,CHENG Kai,LI Hong,ZHU Hongsong,SUN Limin.IoT Security Threat and Security Model[J].Journal of Cyber Security,2023,8(5):81-95   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 6009次   下载 3810 本文二维码信息
码上扫一扫!
物联网安全威胁与安全模型
郑尧文1, 文辉1, 程凯1,2, 李红1, 朱红松1,2, 孙利民1,2
0
(1.中国科学院信息工程研究所物联网信息安全技术北京市重点实验室 北京 中国 100093;2.中国科学院大学网络空间安全学院 北京 中国 100049)
摘要:
随着物联网应用的发展和普及利用,针对物联网的攻击事件日益增多且危害严重。目前面对物联网安全问题主要采用被动补救的方式,缺乏对物联网安全的体系化思考和研究。本论文首先介绍物联网系统架构和各实体的发展,然后分析物联网面临的多层次安全威胁,包括各实体自身的安全威胁,也包括跨域的安全威胁。其中,实体自身安全威胁涉及到云平台、设备端、管道、云端交互。物联网跨域安全威胁包含4个方面:多域级联攻击、物理域的冲突与叠加、信息域对物理域进行非预期的控制、信息域对物理域输入的理解不全面。在此基础上,论文研究了基于PDRR网络安全体系的物联网安全模型,包含安全防护、安全检测、响应、恢复4个维度。安全防护包含认证、授权与访问控制、通信加密等技术,需要考虑物联网种类繁多,规模巨大,异构等特点进行设计与实施。安全检测需要对各实体进行入侵检测、在线安全监测、脆弱性检测以及恶意代码检测。其中,在线安全监测获取系统内部设备、应用程序的行为、状态、是否存在已知脆弱性等。脆弱性检测偏向于对未知脆弱性进行深度挖掘。在响应阶段,除了配合相关部门机关完成安全行动资源配置、态势感知等响应工作外,还需要进行入侵事件的分析与响应,漏洞与恶意代码的公告与修复,以及安全防护加固与检测规则的更新。在恢复阶段,需要对关键数据进行恢复,并对系统进行升级与恢复。最后论文进行总结并提出值得关注的研究方向。
关键词:  物联网安全|安全威胁|安全模型|PDRR 模型
DOI:10.19363/J.cnki.cn10-1380/tn.2023.09.06
投稿时间:2020-04-01修订日期:2020-07-08
基金项目:本课题得到广东省重点研发计划(No. 2019B010137004), 国家自然科学基金联合基金项目(No. U1766215)资助。
IoT Security Threat and Security Model
ZHENG Yaowen1, WEN Hui1, CHENG Kai1,2, LI Hong1, ZHU Hongsong1,2, SUN Limin1,2
(1.Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;2.School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China)
Abstract:
With the development and widespread use of Internet of Things (IoT) applications, attacks on the IoT are becoming more frequent and more serious. Currently, the main approach to address IoT security issues is passive remediation, lacking systematic thinking and research on IoT security. Therefore, in this paper, we first introduce the IoT system architecture and the development of various entities. Then, we analyze the multi-level security threats faced by the IoT system, including the security threats of the entities themselves and cross-domain security threats. The security threats of the entities themselves involve cloud platforms, device ends, pipelines, and cloud-end interactions. The cross-domain security threats of the IoT include four aspects: multi-domain cascading attacks, conflicts and overlaps in physical domains, unexpected control of physical domains by cyber domains, and incomplete understanding of physical domains by cyber domains. Based on it, we present an IoT security model based on PDRR network security framework, including four dimensions: security protection, security detection, response, and recovery. Security protection includes technologies such as authentication, authorization and access control, and communication encryption. It requires considering the wide variety, large scale, and heterogeneity of the IoT in design and implementation. Security detection requires intrusion detection, online security monitoring, vulnerability detection, and malicious code detection for each entity. Online security monitoring obtains the behavior, status, and known vulnerabilities of internal devices and applications, while vulnerability detection focuses on in-depth exploration of unknown vulnerabilities. In the response phase, in addition to coordinating with relevant departments to complete security action resource allocation and situational awareness response work, it is also necessary to analyze and respond to intrusion events, announce and fix vulnerabilities and malicious code, and update security protection and detection rules. In the recovery phase, it is necessary to recover critical data and upgrade and restore the system. Finally, we summarize the paper and present some research directions worth attention.
Key words:  IoT security|security threat|security model|PDRR model