IoT: Communication protocols and security threats

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and privacy threats in IoT architectures

In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture, with attacker centric and system centric approaches. Our strong view is that IoT will be an important part of the global huge ICT infrastructure (“future Internet”) humanity will be strongly relying o...

متن کامل

Security Threats on National Defense ICT based on IoT

In this paper, we drew new security threats on IoT (Internet of Thing) based modern battlefield (Network centric battlefield). DoD is focusing its attention on the development of unmanned combat systems to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. IoT has the security vulnerabilities of each element of the technology its...

متن کامل

Internet of Things (IOT) Standards, Protocols and Security Issues

The internet of things (IOT) is the new revolution of internet after PCS and ServersClients communication now sensors, smart object, wearable devices, and smart phones are able to communicate. Everything surrounding us can talk to each other. life will be easier and smarter with smart environment, smart homes,smart cities and intelligent transport and healthcare.Billions of devices will be comm...

متن کامل

Adaptive and composite privacy and security mechanism for IoT communication

With billions of connected devices expected in near future, the number and nature of IoT networks and their various interactions is certain to grow rapidly. As a result, the need for security and privacy of IoT networks during such interactions is a subject of major interest. Security & privacy related aspects need to take into consideration the context and purpose of such diverse types of inte...

متن کامل

Impact of Duty Cycle Protocols on Security Cost of IoT

With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Internet of things and cyber-physical systems

سال: 2023

ISSN: ['2667-3452']

DOI: https://doi.org/10.1016/j.iotcps.2022.12.003