{"title":"物联网安全相关挑战综述","authors":"E. Ezema, Nfm Sani A.Abdullah","doi":"10.17781/P002493","DOIUrl":null,"url":null,"abstract":"The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenge to the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size clusters. In each cluster, the cluster heads are selected, to transmit data to base station. The cluster heads are selected in the network based on the energy of each node and distance from sensor node to base station. The energy of the sensor node is dissipated when each node receives or transmits data to the base station. The energy is also consumed when the sensor nodes aggregate data to cluster head. In this paper, we analyze existing research works in IoT system and proposed security approaches. In the literature, we have studied that many related challenges have been discovered and work on, but they are still open challenges to these different approaches and techniques. The paper highlights various security challenges of IoT and contributions from researcher.","PeriodicalId":211757,"journal":{"name":"International journal of new computer architectures and their applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Comprehensive Survey of Security Related Challenges in Internet of Things\",\"authors\":\"E. Ezema, Nfm Sani A.Abdullah\",\"doi\":\"10.17781/P002493\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenge to the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size clusters. In each cluster, the cluster heads are selected, to transmit data to base station. The cluster heads are selected in the network based on the energy of each node and distance from sensor node to base station. The energy of the sensor node is dissipated when each node receives or transmits data to the base station. The energy is also consumed when the sensor nodes aggregate data to cluster head. In this paper, we analyze existing research works in IoT system and proposed security approaches. In the literature, we have studied that many related challenges have been discovered and work on, but they are still open challenges to these different approaches and techniques. The paper highlights various security challenges of IoT and contributions from researcher.\",\"PeriodicalId\":211757,\"journal\":{\"name\":\"International journal of new computer architectures and their applications\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of new computer architectures and their applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17781/P002493\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of new computer architectures and their applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17781/P002493","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Survey of Security Related Challenges in Internet of Things
The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenge to the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size clusters. In each cluster, the cluster heads are selected, to transmit data to base station. The cluster heads are selected in the network based on the energy of each node and distance from sensor node to base station. The energy of the sensor node is dissipated when each node receives or transmits data to the base station. The energy is also consumed when the sensor nodes aggregate data to cluster head. In this paper, we analyze existing research works in IoT system and proposed security approaches. In the literature, we have studied that many related challenges have been discovered and work on, but they are still open challenges to these different approaches and techniques. The paper highlights various security challenges of IoT and contributions from researcher.