{"title":"物联网传感器的安全通信策略","authors":"S. N, Monica R. Mundada","doi":"10.1109/i-PACT52855.2021.9696487","DOIUrl":null,"url":null,"abstract":"Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured Communication Strategies for Internet of Things Sensors\",\"authors\":\"S. N, Monica R. Mundada\",\"doi\":\"10.1109/i-PACT52855.2021.9696487\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.\",\"PeriodicalId\":335956,\"journal\":{\"name\":\"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/i-PACT52855.2021.9696487\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/i-PACT52855.2021.9696487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured Communication Strategies for Internet of Things Sensors
Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.