Abstract

Recent years have witnessed that Internet of Things (IoT) became more and more popular in many technical fields. Due to its high utility, IoT is closely linked with a number of domains in people’s daily life; hence, it is really crucial and necessary to reinforce and maintain the security of IoT. In fact, there are numerous protocols proposed to protect it, and these researches aim to find an effective way to resist attacks from hackers. In order to improve safety index of the existing models and build a nearly brilliant model. This paper analyzes and compares three published studies which are relevant to this topic through several factors. This paper describes these protocols from an understandable and explicit perspective which makes readers easy to catch the main idea of each protocol. After detailed explanation of the algorithm and analysis of several safety indicators, according to several comparison tables and bar charts, we finally figure out the best protocol among these three studies, and specific results are showed in the paper. Furthermore, we also give some available and useful suggestions about the future work to optimize the protocol in this industry.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.