One secure IoT scheme for protection of true nodes

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As a new generation of information technologies, IoT has been applied into many industrial fields and made great contributions to our everyday life. However, vulnerability of IoT constrains the application of IoT, especially, when the node used in IoT systems is malicious one which may break the system and leakage vital data (for example, nodes used by patient to transfer condition data). To tackle the security concerning, we propose one secure IoT framework used to protect true nodes and ensure the secure operation. Firstly, we introduce two types of IoT classic architectures and summarize the security challenges, then we give an introduction and comparison of several IoT security frameworks. At last, we propose our scheme for protecting the safety of IoT nodes in the perception layer.

Cite

CITATION STYLE

APA

Fan, Y., Zhao, G., Lin, X., Sun, X., Zhu, D., & Lei, J. (2018). One secure IoT scheme for protection of true nodes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11344 LNCS, pp. 143–152). Springer Verlag. https://doi.org/10.1007/978-3-030-05755-8_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free