The research on security technology for low-performance iot sensor node

1Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Background/Objectives: IoT developmental background: IoT, which is the key technology in the fourth industrial revolution, utilizes the Internet. Particularly, the growth of convergence products that utilize it has been constant with the demands of IoT services using the network of the Internet. Methods/Statistical analysis: IoT network consists of products equipped with various sensors to communicate; sensor nodes are made up of low volume memory, low performance CPU, and battery when they are used in the network. There has been the demand of secure transmission of information measured by a sensor node to the IoT platform. We conduct a study on how we can improve security in the IoT environment. Findings: Generally, sensor nodes are applied with basic security provided by IoT communication protocol rather than their own encryption. Therefore, sensor nodes are vulnerable in terms of security and the IoT platform that utilizes information collected by them would process distorted information. In order to draw a strategy to prevent security breach, we analyze security threat and the type of attacks. Improvements/Applications: We suggest a countermeasure to deal with security threat of sensor nodes and situations in which sensor nodes are vulnerable in IoT environment. To secure integrity of communication and transaction between a sensor node and an IoT platform in the future, the application of block chain technology into the IoT environment is necessary.

Cite

CITATION STYLE

APA

Ju, Y., & Mun, H. J. (2018). The research on security technology for low-performance iot sensor node. International Journal of Engineering and Technology(UAE), 7(3.34 Special Issue  34), 594–597. https://doi.org/10.14419/ijet.v7i3.34.19389

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free