{"title":"建议使用安全性增强的第三方物联网框架","authors":"Effy Raja Naru, H. Saini, Geetanjali Rathee","doi":"10.1109/ISPCC.2017.8269752","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is the future of next era of the Internet which connects various physical objects by communicating with each other without the aid of human interactions. Applications of IoT become important in day to day lifestyle such as healthcare, smart grid, smart home, smart parking. Various IoT sensors such as temperature sensors, fault sensors track monitoring sensors are used to make an intelligent railway system which monitoring the railway stations. IoT application is useful to human yet if the IoT system shield the client data from a hacker, attacks, and vulnerabilities. Security plays an important role in network to prevent the unauthorized access, misuses of data, monitoring and data, modification etc. In conventional network security, intruder may destroy modification, monitor the information and allow the unauthorized person to access the system. Similarly, IoT is endured from various security attacks. Although we have numerous cryptographic algorithms, however these are not suitable for constrained devices because of their large key size like RSA. Our proposed security IoT architecture generates a secret key and its administration by the notarization mechanism for securing the data.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Proposed IoT framework using third party with enhanced security\",\"authors\":\"Effy Raja Naru, H. Saini, Geetanjali Rathee\",\"doi\":\"10.1109/ISPCC.2017.8269752\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) is the future of next era of the Internet which connects various physical objects by communicating with each other without the aid of human interactions. Applications of IoT become important in day to day lifestyle such as healthcare, smart grid, smart home, smart parking. Various IoT sensors such as temperature sensors, fault sensors track monitoring sensors are used to make an intelligent railway system which monitoring the railway stations. IoT application is useful to human yet if the IoT system shield the client data from a hacker, attacks, and vulnerabilities. Security plays an important role in network to prevent the unauthorized access, misuses of data, monitoring and data, modification etc. In conventional network security, intruder may destroy modification, monitor the information and allow the unauthorized person to access the system. Similarly, IoT is endured from various security attacks. Although we have numerous cryptographic algorithms, however these are not suitable for constrained devices because of their large key size like RSA. Our proposed security IoT architecture generates a secret key and its administration by the notarization mechanism for securing the data.\",\"PeriodicalId\":142166,\"journal\":{\"name\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"volume\":\"168 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCC.2017.8269752\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCC.2017.8269752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
摘要
物联网(Internet of Things, IoT)是下一个互联网时代的未来,它可以在没有人类互动的情况下,通过相互通信将各种物理对象连接起来。物联网的应用在医疗保健、智能电网、智能家居、智能停车等日常生活方式中变得越来越重要。各种物联网传感器,如温度传感器,故障传感器,轨道监控传感器,用于制造智能铁路系统,监控火车站。物联网应用对人类是有用的,但如果物联网系统保护客户端数据免受黑客,攻击和漏洞。网络安全在防止未经授权的访问、数据的滥用、监控和修改等方面起着重要的作用。在传统的网络安全中,入侵者可以破坏修改、监视信息和允许未经授权的人访问系统。同样,物联网也承受着各种安全攻击。虽然我们有许多加密算法,但是这些算法都不适合像RSA这样的受约束的设备,因为它们的密钥大小很大。我们提出的安全物联网架构通过公证机制生成密钥并对其进行管理,以保护数据。
Proposed IoT framework using third party with enhanced security
Internet of Things (IoT) is the future of next era of the Internet which connects various physical objects by communicating with each other without the aid of human interactions. Applications of IoT become important in day to day lifestyle such as healthcare, smart grid, smart home, smart parking. Various IoT sensors such as temperature sensors, fault sensors track monitoring sensors are used to make an intelligent railway system which monitoring the railway stations. IoT application is useful to human yet if the IoT system shield the client data from a hacker, attacks, and vulnerabilities. Security plays an important role in network to prevent the unauthorized access, misuses of data, monitoring and data, modification etc. In conventional network security, intruder may destroy modification, monitor the information and allow the unauthorized person to access the system. Similarly, IoT is endured from various security attacks. Although we have numerous cryptographic algorithms, however these are not suitable for constrained devices because of their large key size like RSA. Our proposed security IoT architecture generates a secret key and its administration by the notarization mechanism for securing the data.