物联网英文文献

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

CRVol.14,No1&2,2004ADISCUSSIONOFCURRENTANDPOTENTIALISSUESRELATINGINFORMATIONSECURITYFORINTERNETCOMMUNICATIONSbyJagannathanV.IyengarINTRODUCTIONInformationsecurityisaboutprotectingthreethings:theconfidentiality,theintegrity,andtheavailabilityofdata.SecuringInternetCommerceisprobablythebiggestchallengethatinformationprofessionalshaveyetfaced.Fiveyearsago,InternetCommercedidnotexist.Todayitisattractingenormousfinancialinterest.InvestorsareenthusiasticallybackingcompaniesthatpromisetodeliverthehardwareandsoftwarethatInternetCommercerequires.CompaniesareinvestinginpurchasesofhardwareandsoftwaretopermitthemtoengageinInternetCommerce.Formanycompanies,InternetCommercemeanstakingcreditcardordersfromcustomersshoppingelectroniccatalogsontheWorldWideWeb.Forothers,InternetCommercemeansdealingelectronicallywithclientsandsuppliersratherthandealingoverthetelephoneorfaxmachine.Anareaofincreasingimportance,whichoverlapsbothoftheothers,isdigitalauthenticationofanythingfromcontractsandinvoicestophotographsandsoundbites.TheissuesinvolvedinInternetCommerceaffectcompanieslargeandsmall.AsofJanuary1996,halfofallbusinesseswithmorethan1000employeeshadatleastonewebsite,accordingtoarecentsurvey.Thesamesurveyalsofoundthattwo-thirdsofallcompanieswithwebsiteshadlessthan100companies.TheInternetisattractivetosmallercompaniesbecauseitenablesthemtoreachawiderangeofmarkets,includingthemarketsthatmuchlargercompaniesenjoy.Atthesametimemostcorporationsseeenoughpotentialtoinvestsignificantdollars.INFORMATIONATTRIBUTESININTERNETThereisconsiderable,andjustifiable,fearthatconfidentialinformationsuchascreditcardandpersonaldetailscouldbeinterceptedduringtransmissionovertheInternetwhensubmittinganorderformontheweb.ThechallengeistotransmitandreceiveinformationovertheInternetwhileinsuringthat:(1)itisinaccessibletoanyonebutsenderandreceiver,(2)ithasnotbeenchangedduringtransmission,(3)thereceivercanbesureitcamefromthesender,(4)thesendercanbesurethereceiverisgenuine,and(5)thesendercannotdenyhe/shesentit.Withoutspecialsoftware,allInternettraffictravelsintheclearandsoanyonewhomonitorstrafficcanreadit.ThisformofattackisrelativelyeasytoaccomplishusingfreelyavailablepacketsniffingsoftwaresincetheInternethastraditionallybeenaveryopennetwork.IfyouweretotracetherouteofamessageacrosstheInternetyoucouldseehowmanysystemsthedatapassesthroughonthewayfromclienttoserver.Atthebeginningandattheendofthelistyouwillprobablyseelocalproviders.Mostoftheseareconsideredeasytargetsbyhackers,particularlyifthelocalproviderhasserversonacollegecampus.Inbetweenyouwouldprobablyseeseveralmachinesoperatedbymajorcommunicationsproviders,suchasSprintorMCI.Thesemaybemoresecure,butillegalpenetrationofeventhesesystemsposesnoproblemtosomehackers.ENCRYPTIONTypically,asniffingattackproceedsbycompromisingalocalprovideratoneendofthetransmission.Nospecialphysicalaccessisrequired.Passwordandcreditcardscanbedistinguishedfromtherestofthetrafficusingsimplepatternmatchingalgorithms.Thedefenseagainstthistypeofattackistoencryptthetraffic,oratleastthatportionwhichcontainsthesensitivedata.However,encryptionreducessystemperformanceandrequirescoordinationbetweenlegitimatepartiestothecommunication.Incommercialterms,suchcoordinationrequireswidespreadstandardsforsecuredtransactions,whichhavebeenslowtoemerge.Protectingtransactionsisonlyoneelementofthesecuretransactionproblem.Onceconfidentialinformationhasbeenreceivedfromaclientitmustbeprotectedontheserver.Currentlywebserversareamongthesoftesttargetsforhackers,largelyduetotheimmaturityofthetechnology.Thestandardsecurityadviceforwebserversistotreatthemachineasasacrificiallamb,i.e.,unconnectedtoanyin-housenetworksandregularlybackedupinordertorecoverfromtheinevitableattacks.However,manycurrentwebapplicationsrequirethatthewebserverinteractwithcompanydatabases,necessitatingalinktointernalnetworks.Thislinkthenbecomesapathwayintoyoursystemsfromyourwebsite.While90CRVol.14,No1&2,2004firewalltechnologycanhelptoblockthispath,itisseldominstalledormaintainedeffectivelyanddoesnotprotectmanywebservices.VirtualprivatenetworksareaspecializedformofencryptedInternettransactionallowingasecurechanneltobeestablishedbetweentwosystemsforthepurposesofelectronicdatainterchange.Thisdiffersfromcreditcardandconsumer-orderingtransactionsinthatthevolumeofdatabetweenthetwopartiesisgreaterandthetwopartiesarewellknowtoeachother.Thismeansthatcomplexandproprietaryencryptionandauthenticationtechniquescanbeusedsincethereisnopretensetoofferuniversalconnectivitythroughthischannel.Despitethepotentialforgreatersecuritythevirtualprivatenetworkisstillaworryingdevelopmentfromasecurityperspective.Forstarters,thereistheattentionthatthisincreasedsecuritywillattractfromhackersandcyberpunks,possiblyleadingtoembarrassingorevencostlycrackingofcodes.However,eveniftheencryptiontechniquesemployedbythedigitalchannelsystemscurrentlyonthemarketorunderdevelopmentprovetobeverypowerful,thusinsuringconfidentialityandavailabilityofdata,thisstillleavesthethirdaspectofsecurity,availability.Fortheforeseeablefuture,thereisahugepotenti

1 / 6
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功