As a new generation of information technologies, IoT has been applied into many industrial fields and made great contributions to our everyday life. However, vulnerability of IoT constrains the application of IoT, especially, when the node used in IoT systems is malicious one which may break the system and leakage vital data (for example, nodes used by patient to transfer condition data). To tackle the security concerning, we propose one secure IoT framework used to protect true nodes and ensure the secure operation. Firstly, we introduce two types of IoT classic architectures and summarize the security challenges, then we give an introduction and comparison of several IoT security frameworks. At last, we propose our scheme for protecting the safety of IoT nodes in the perception layer.
CITATION STYLE
Fan, Y., Zhao, G., Lin, X., Sun, X., Zhu, D., & Lei, J. (2018). One secure IoT scheme for protection of true nodes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11344 LNCS, pp. 143–152). Springer Verlag. https://doi.org/10.1007/978-3-030-05755-8_15
Mendeley helps you to discover research relevant for your work.