S. D. Castilho, E. P. Godoy, Tayane W. L. Castilho, Fadir Salmen
{"title":"Proposed model to implement high-level Information Security in Internet of Things","authors":"S. D. Castilho, E. P. Godoy, Tayane W. L. Castilho, Fadir Salmen","doi":"10.1109/FMEC.2017.7946425","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC.2017.7946425","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.