物联网传感器的安全通信策略

S. N, Monica R. Mundada
{"title":"物联网传感器的安全通信策略","authors":"S. N, Monica R. Mundada","doi":"10.1109/i-PACT52855.2021.9696487","DOIUrl":null,"url":null,"abstract":"Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured Communication Strategies for Internet of Things Sensors\",\"authors\":\"S. N, Monica R. Mundada\",\"doi\":\"10.1109/i-PACT52855.2021.9696487\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.\",\"PeriodicalId\":335956,\"journal\":{\"name\":\"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/i-PACT52855.2021.9696487\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/i-PACT52855.2021.9696487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网是通过在不同的低功耗插入设备之间自由传输数据来实现的,这些设备利用互联网相互通信。预计物联网将被普遍传达,并将在生活的不同领域发现针对性。物联网的需求最近得到了极大的考虑,并且增加了对部署此类网络将产生的信息的业务估计的关联。出乎意料的是,物联网对最终用户有不同的隐私和安全担忧,这限制了它的乘法。本文管理了不同的提议物联网安全要求,这些要求能够进行安全通信的验证,可访问性,加密和可信度。本文主要围绕物联网传感器的安全需求、物联网网络通信各种安全前提条件的难点和开放问题、物联网通信技术及其应用和开放研究问题展开。对每个模型进行了比较,并给出了所有的关键特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secured Communication Strategies for Internet of Things Sensors
Internet of things is acknowledged by free progression of data among different low-power inserted gadgets which utilize the internet to communicate with each other. It is anticipated that the IoT will be generally conveyed and will discover pertinence in different areas of life. Requests of IoT have recently pulled in tremendous consideration, and associations are amped up for the business estimation of the information that will be generated by deployment of such networks. Unexpectedly, IoT has different privacy and security worries for the end users which limit its multiplication. This paper manages the different proposed IoT security requirements that are capable for verification, accessibility, encryption and trustworthiness for secure communication. The paper has been centered on security necessities for Internet of Things sensors, difficulties and open issues for various security prerequisites in IoT network communication, technologies for IoT communication, and their applications and open research issues. Each model has been compared and all the critical features have been presented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Abnormality Detection in Humerus Bone Radiographs Using DenseNet Random Optimal Search Based Significant Gene Identification and Classification of Disease Samples Co-Design Approach of Converter Control for Battery Charging Electric Vehicle Applications Typical Analysis of Different Natural Esters and their Performance: A Review Machine Learning-Based Medium Access Control Protocol for Heterogeneous Wireless Networks: A Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1