A Distributed Security Scheme to Secure Data Communication between Class-0 IoT Devices and the Internetنوشته شده توسط
- نام نویسندگان: James King
Constrained devices are devices with limited resources such as CPU, memory (ROM and RAM), and battery life. These devices often function as sensors collecting information, machine to machine (M2M) or smart devices controlling electrical appliances and services. When these devices are connect to a network they become known as “things” and become part of the “Internet of Things” (IoT), a network of objects such as embedded computers, controllable and intelligent automated devices (smart devices), and sensors with the ability to connect and exchange data with other devices and services. IoT devices are being connected to the internet to allow for the collection and exchange of data with web servers and cloud data centers.
Efforts are being made to standardize IoT devices and how they communicate with the web. Data communication in the web is primarily conducted using HTTP which was not designed for constrained environments and carries a lot of overhead. Other protocols for more tailored for IoT such as CoAP has been developed by Constrained RESTful environments (CORE) as part of the Internet Engineering Task Force (IETF) and is a specialized application layer, web transfer
protocol designed to be used with devices such as resource constrained IoT.
- سال انتشار: سه شنبه, 13 مهر 1395
- دانشگاه: Lulea University of Technology
- مقطع: Master Degree
- James-King.pdf (230 بارگیری)