Proceedings of 2013 3rd International Conference on Computer Science and Network Technology 2013
DOI: 10.1109/iccsnt.2013.6967233
|View full text |Cite
|
Sign up to set email alerts
|

Research on the basic characteristics, the key technologies, the network architecture and security problems of the Internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 1 publication
0
22
0
Order By: Relevance
“…IoT networks do not have the computing power to make miners compete for [26] [27]. This is the main reason why blockchain implementations for IoT are mostly hosted in the cloud.…”
Section: Blockchain For Iotmentioning
confidence: 99%
“…IoT networks do not have the computing power to make miners compete for [26] [27]. This is the main reason why blockchain implementations for IoT are mostly hosted in the cloud.…”
Section: Blockchain For Iotmentioning
confidence: 99%
“…Firewalls, IPS, IDS, ingress/egress filtering structures, internet protocol security (IPsec), secure Sockets Layer/Transport Layer Security (SSL/TSL) should be used in order to ensure network security. HTTPS is used for application to encrypt to message (Sadeghi et al, 2015;Xingmei et al, 2013). Data privacy is major issue for IoT health devices and applications because of the ubiquitous character of the IoT environment.…”
Section: Security Solution Of Iot Health Applicationsmentioning
confidence: 99%
“…However, RFID has some security vulnerabilities such as reverse engineering, eavesdropping, man-in-the-middle attack, spoofing etc. When data is sent by RFID technology, some security measures are taken owing to provide privacy protection (Xingmei and Jing, 2013).…”
Section: Security Solution Of Iot Health Applicationsmentioning
confidence: 99%
“…Classic Internet approaches need to be revised to address the complex requirements imposed by IoT. This asks for the development of intelligent algorithms for routing [1], information sharing security [6], [5], novel network paradigms [8], [14], [16], new services [11], [15], and advanced techniques for data fusion [3].…”
Section: Introductionmentioning
confidence: 99%