IOT Supported Security Considerations for Network

K. Thamizhmaran
{"title":"IOT Supported Security Considerations for Network","authors":"K. Thamizhmaran","doi":"10.37394/23204.2020.19.14","DOIUrl":null,"url":null,"abstract":"The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of \"the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows the protection of both constrained and unconstrained IoT devices through robust encryption as wellas authentication so that both can equally leverage from the same security framework, but still maintaining lowcomputational loads, by avoiding excessive computational operations.","PeriodicalId":330638,"journal":{"name":"WSEAS TRANSACTIONS ON COMMUNICATIONS","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"WSEAS TRANSACTIONS ON COMMUNICATIONS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37394/23204.2020.19.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows the protection of both constrained and unconstrained IoT devices through robust encryption as wellas authentication so that both can equally leverage from the same security framework, but still maintaining lowcomputational loads, by avoiding excessive computational operations.
物联网支持的网络安全注意事项
当前的IP和其他网络(如电力智能电网)正在快速发展,从而导致多种连接方法。这导致了“物联网”(IoT)方法的出现,其目标是将当前的IP和相关网络转换为设备到设备(D-2-D)的基础。它将通过不同类型的智能设备和传感器无缝连接全球,这将导致到2022年超过200亿个互联网连接对象和传感器(事物)的大量数据生成和交换。由此产生的结构将有利于人类,帮助我们做出艰难的决定,并提供有益的服务。在本文中,我们概述了支持物联网的网络架构以及相关对象和设备的安全性。我们首先描述一个通用的物联网网络的安全架构,以及构成它们的各种元素是如何相互作用的。然后,我们描述了一种方法,该方法允许通过强大的加密和身份验证来保护受约束和不受约束的物联网设备,这样两者都可以从相同的安全框架中平等地利用,但仍然保持低计算负载,避免过度的计算操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信