Information Security Applications

N/ACitations
Citations of this article
166Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is critical to include cyber security measures at the designing stage of the real-life control systems in order to avail the application of the IoT-related devices, such as intelligent terminals or smart sensors, etc. to the system. This is due to the difference between the attributes of the IoT security measures and those of the Internet-related IT security. It requires a differentiated approach with new security concepts and operation methods. This paper outlines the security issues specific to of the hyper-connected society, where things are being applied to control systems, and suggest technical and organizational measures to be considered for designing of secure control system based on IoT.

Cite

CITATION STYLE

APA

Chae, K.-J., & Yung, M. (Eds.). (2004). Information Security Applications (Vol. 2908, pp. 162–173). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/b95188

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free