Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra, M. Safder
{"title":"物联网安全机制研究综述","authors":"Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra, M. Safder","doi":"10.1109/ICACS47775.2020.9055949","DOIUrl":null,"url":null,"abstract":"The web of the IoT has been started but also had some serious issues related to its security. It doesn't matter to what level its vulnerability affects. It can be domestic or any enterprise level. Billions of devices are linked with the internet. It is the network of objects and sensors by which these devices exchange data with each other without human involvement. On a large scale, there is a struggle to protect data from leaking. The main purpose of this is to review the survey of the work done in security in the specific area. As a whole, this study is measuring the flaws in the security related to the Internet of Things. Design and Protocols are studied in this survey for securing the communications between so-called ‘things'. Open inspection problems and security application challenges in IoT security are still present. This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.","PeriodicalId":268675,"journal":{"name":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","volume":"248 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Review of Security Machanism in internet of Things(IoT)\",\"authors\":\"Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra, M. Safder\",\"doi\":\"10.1109/ICACS47775.2020.9055949\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The web of the IoT has been started but also had some serious issues related to its security. It doesn't matter to what level its vulnerability affects. It can be domestic or any enterprise level. Billions of devices are linked with the internet. It is the network of objects and sensors by which these devices exchange data with each other without human involvement. On a large scale, there is a struggle to protect data from leaking. The main purpose of this is to review the survey of the work done in security in the specific area. As a whole, this study is measuring the flaws in the security related to the Internet of Things. Design and Protocols are studied in this survey for securing the communications between so-called ‘things'. Open inspection problems and security application challenges in IoT security are still present. This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.\",\"PeriodicalId\":268675,\"journal\":{\"name\":\"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)\",\"volume\":\"248 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACS47775.2020.9055949\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Advancements in Computational Sciences (ICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACS47775.2020.9055949","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of Security Machanism in internet of Things(IoT)
The web of the IoT has been started but also had some serious issues related to its security. It doesn't matter to what level its vulnerability affects. It can be domestic or any enterprise level. Billions of devices are linked with the internet. It is the network of objects and sensors by which these devices exchange data with each other without human involvement. On a large scale, there is a struggle to protect data from leaking. The main purpose of this is to review the survey of the work done in security in the specific area. As a whole, this study is measuring the flaws in the security related to the Internet of Things. Design and Protocols are studied in this survey for securing the communications between so-called ‘things'. Open inspection problems and security application challenges in IoT security are still present. This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.