Smart objects, particularly sensor networks, are vulnerable by
their very nature because of the lack of security support in the
primary design of low lossy networks. Their previous status
did not face the need to ensure secure transmissions. Information
about measurements such as temperature and
humidity is not so attractive for attackers. Nevertheless, the
rapid growth of system automation, the massive production
of sensors and smart devices and their integration in the
smart environments reveal security deficits and raises
possible threats from malicious users. Security add-on
features in an insecure design cannot replace the capabilities
of a securely designed network. Moreover, the limited
resources of smart objects in terms of memory, CPU and
energy make the inclusion of add-on security features even
harder.
Smart objects, particularly sensor networks, are vulnerable bytheir very nature because of the lack of security support in theprimary design of low lossy networks. Their previous statusdid not face the need to ensure secure transmissions. Informationabout measurements such as temperature andhumidity is not so attractive for attackers. Nevertheless, therapid growth of system automation, the massive productionof sensors and smart devices and their integration in thesmart environments reveal security deficits and raisespossible threats from malicious users. Security add-onfeatures in an insecure design cannot replace the capabilitiesof a securely designed network. Moreover, the limitedresources of smart objects in terms of memory, CPU andenergy make the inclusion of add-on security features evenharder.
การแปล กรุณารอสักครู่..
