Research on Data Security Technology in Internet of Things

2013 ◽  
Vol 433-435 ◽  
pp. 1752-1755 ◽  
Author(s):  
Yan Ling Zhao

The Internet of Things is currently the most popular field of communication and information research directions. Their application in the amount of information involved, are extremely large amount of data. How to ensure the transmission efficiency of business information under the premise of improving networking applications data security to protect the user's privacy data will be particularly important. Paper uses a custom data packet encapsulation mechanism, reducing the overhead of data resources; another based on their cross-platform communication features, combined with secure encryption and decryption, signature and authentication algorithm, the establishment of a secure communication system of things model for the differentiation of things communications environment, providing a standard packet structure, namely smart business security IOT application Protocol intelligent Service Security Application Protocol (ISSAP).

Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


Author(s):  
Elodie Attié ◽  
Lars Meyer-Waarden

The internet of things, or the IoT, is progressively and surely invading environments, and is consequently creating new kinds of consumer needs and behaviors. More and more companies are getting involved in this growing field, showing the importance for them to understand this technology market. This chapter aims at studying the acceptance process of the IoT. More specifically, the main factors that influence consumer decisions to accept and use the IoT and smart objects have been tested, such as the ethical, wellbeing, social, and utility values. The importance of each benefit is demonstrated, according to specific targets and to examples of applications. A system of values that represents the promises of the IoT and the central needs of users is also described. Besides, a typology of users should help companies creating or refining targeting strategies and should guide consumers into their acceptance process. Finally, further research directions are discussed.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2013 ◽  
Vol 448-453 ◽  
pp. 3688-3690
Author(s):  
Jia Qu

The Internet of Things technology the grafted of e-commerce platform by many businesses and websites sought after. Even some e-commerce sites claim to have satisfied the requirements of the "Internet of Things", or will soon be able to achieve the "Internet of Things". With China's e-commerce platform model mature technical means escalation, the basic realization of the transaction facilitation payment security technology, user-friendly service. China's e-commerce market has also embarked on a peak, along with businesses and Internet users have a more in-depth requirements of the e-commerce platform. This article focuses on descriptions of Things. Impact of e-commerce and the Internet of things to do the analysis and description.


2021 ◽  
Vol 2021 ◽  
pp. 1-1
Author(s):  
Umair Khadam ◽  
Muhammad Munwar Iqbal ◽  
Meshrif Alruily ◽  
Mohammed A. Al Ghamdi ◽  
Muhammad Ramzan ◽  
...  


Sign in / Sign up

Export Citation Format

Share Document