منابع مشابه
New Security Architecture for IoT Network
We explain the notion of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture works with or without infrastructure, that we call SDN-Domain. This work describes the operation of the proposed architecture and summarizes the opportunity to achieve network security in a more efficient and flexible with SDN. An ov...
متن کاملIoT Architecture
The Internet of Things domain will encompass an extremely wide range of technologies, from stateless to stateful, from extremely constrained to unconstrained, from hard real time to soft real time. Therefore, single reference architecture cannot be used as a blueprint for all possible concrete implementations. While a reference model can probably be identified, it is likely that several referen...
متن کاملIoT Security: A Survey
The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...
متن کاملData Security and Privacy in the IoT
Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this paper, after outlining key challenges in data security and privacy, we summarize research directions for securing IoT data, including efficient and scalable encryption protocols, software...
متن کاملEnforcing Security in IoT and Home Networks
Modern home and corporate networks are interconnecting many different devices types other than personal computers and printers. It is pretty common to have surveillance cameras or thermometers and control them through cloud-based services. Security-wise this practice can create potential threats when connected devices are not kept updated or if they can freely access the network. This paper des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
سال: 2020
ISSN: 0973-8975,2454-7190
DOI: 10.26782/jmcms.2020.06.00014