{"title":"Securing IoT elements in Smart City environments","authors":"P. Glemba, P. Břečka, Martin Pecho, Roman Hudec","doi":"10.1109/ASDAM55965.2022.9966751","DOIUrl":null,"url":null,"abstract":"There are a number of security standards for the IT field, and a number of them already specialize in the IoT field. However, the speed of development and the degree of implementation of IoT elements in everyday life is faster than the creation of corresponding security concepts. This becomes an obstacle to the wider implementation of IoT solutions. This particularly affects solutions working with sensitive data. A specific subset is the use of video technologies. As part of the experiment, the authors were looking for the most suitable data security concept that can be used on a wider scale. They proposed the implementation of a concept suitable especially for data security of mobile IoT elements working with sensitive data. These are located in the field and often have a limited ability of physical security.","PeriodicalId":148302,"journal":{"name":"2022 14th International Conference on Advanced Semiconductor Devices and Microsystems (ASDAM)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Advanced Semiconductor Devices and Microsystems (ASDAM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASDAM55965.2022.9966751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There are a number of security standards for the IT field, and a number of them already specialize in the IoT field. However, the speed of development and the degree of implementation of IoT elements in everyday life is faster than the creation of corresponding security concepts. This becomes an obstacle to the wider implementation of IoT solutions. This particularly affects solutions working with sensitive data. A specific subset is the use of video technologies. As part of the experiment, the authors were looking for the most suitable data security concept that can be used on a wider scale. They proposed the implementation of a concept suitable especially for data security of mobile IoT elements working with sensitive data. These are located in the field and often have a limited ability of physical security.