Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective

Author(s):  
M. Bala Krishna
Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


2020 ◽  
Vol 57 (6) ◽  
pp. 102308 ◽  
Author(s):  
Christian Esposito ◽  
Oscar Tamburis ◽  
Xin Su ◽  
Chang Choi

2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


Author(s):  
S. Sundar ◽  
Piyush Arora ◽  
Sarthak Agrawal ◽  
R. Kumar ◽  
Harish M. Kittur

<p>In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.</p>


Computing ◽  
2018 ◽  
Vol 101 (7) ◽  
pp. 791-818 ◽  
Author(s):  
Mohammad Dahman Alshehri ◽  
Farookh Khadeer Hussain

Sign in / Sign up

Export Citation Format

Share Document