Abstract

At present, IoT has received extensive attention and has exerted tremendous influence in the life of people and production. The number of actuators and sensors stationed across the world is also growing rapidly. The application of smart devices and smart services has upgraded our lives more refined and more convenient. However, while bringing convenience to our lives, it also brings a series of security and privacy risks. In this article, we have integrated the background knowledge of IoT, including the development process and applications, the mobile edge computing, the security threats, the security requirements and the basic architecture of IoT. On this basis, we focused on the analysis of the mainstream of the academic community. Compared with the IoT security framework adopted by the industry, comparing and evaluating several popular frameworks, we have put forward our own security framework perspectives and possible in-depth research points in the future.

Highlights

  • Smart household Basic conceptThe Internet of Things (IoT), which is the abbreviation of internet of things, is a novel definition in the area of the modern wireless telecommunication systems

  • The IoT, which is the abbreviation of internet of things, is a novel definition in the area of the modern wireless telecommunication systems

  • We show that how the IoT exchanges the daily life of humanity

Read more

Summary

Introduction

The IoT, which is the abbreviation of internet of things, is a novel definition in the area of the modern wireless telecommunication systems. People can use sensors which are set in the industry to ensure the security, control or automation, as the wireless communication system has developed to overcome many disadvantages, it can replace traditional sensors to provide a better flexibility for any kind of requirement whenever and wherever [11,12] This is called an IoT sub-net, which devoted to industry or factory maintenance. Access control is a crucial security technique, which is used to ensure that only authorized users can pay a visit to certain resources, like an IoT device or collected data. The cloud plays the role of server that receives the request from the mobile clients It can provide variety kinds of services to clients and transmit web requests to IoT nodes. The former one is to collect data of the physical world and translate data into digital world, the latter one is to modify the environment to an expected status

Communication
Authorization
Risk indication
Conclusion
Internet of things based on smart objects
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.