{"title":"物联网研究:模型、通信协议、安全隐患与对策","authors":"Manju Bagga, Prateek Thakral, Tarun Bagga","doi":"10.1109/PDGC.2018.8745984","DOIUrl":null,"url":null,"abstract":"IoT is an extreme speed technology comprises of smart things or objects that communicate with one another and ease the job of our daily life. The most common applications of IoT are smart homes, wearables, connected cars, smart cities, smart retail, agriculture, healthcare etc. It is a big revolution in the history of the Internet. Things that connect to the Internet have a lot of chances of potential risks. The IoT applications use sensitive data that is more susceptible to attacks, so we have to compromise the security. Beginning with introducing the IoT model and communication protocols, this paper surveys several security attacks at each layer of IoT model and corresponding countermeasures to protect such a huge heterogeneous network.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures\",\"authors\":\"Manju Bagga, Prateek Thakral, Tarun Bagga\",\"doi\":\"10.1109/PDGC.2018.8745984\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT is an extreme speed technology comprises of smart things or objects that communicate with one another and ease the job of our daily life. The most common applications of IoT are smart homes, wearables, connected cars, smart cities, smart retail, agriculture, healthcare etc. It is a big revolution in the history of the Internet. Things that connect to the Internet have a lot of chances of potential risks. The IoT applications use sensitive data that is more susceptible to attacks, so we have to compromise the security. Beginning with introducing the IoT model and communication protocols, this paper surveys several security attacks at each layer of IoT model and corresponding countermeasures to protect such a huge heterogeneous network.\",\"PeriodicalId\":303401,\"journal\":{\"name\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2018.8745984\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2018.8745984","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures
IoT is an extreme speed technology comprises of smart things or objects that communicate with one another and ease the job of our daily life. The most common applications of IoT are smart homes, wearables, connected cars, smart cities, smart retail, agriculture, healthcare etc. It is a big revolution in the history of the Internet. Things that connect to the Internet have a lot of chances of potential risks. The IoT applications use sensitive data that is more susceptible to attacks, so we have to compromise the security. Beginning with introducing the IoT model and communication protocols, this paper surveys several security attacks at each layer of IoT model and corresponding countermeasures to protect such a huge heterogeneous network.