Information Security Transmission Technology in Internet of Things Control System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Information technology governance in Internet of Things supply chain networks

Purpose The purpose of this paper is to identify and describe the drivers of trading company strategy that explain trading company success in international business. Design/methodology/approach The strategy tripod that results from combining the industry-, resourceand institution-based views, each of which proposes specific drivers of strategic success, was used as the framework for investigati...

متن کامل

Development of an Innovative Internet of Things Security System

Recently, the concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. Certainly, the IoT...

متن کامل

Research on Lightweight Information Security System of the Internet of Things

In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Online Engineering (iJOE)

سال: 2018

ISSN: 1861-2121,1868-1646

DOI: 10.3991/ijoe.v14i06.8707