S. D. Castilho, E. P. Godoy, Tayane W. L. Castilho, Fadir Salmen
{"title":"提出了在物联网中实现高层次信息安全的模型","authors":"S. D. Castilho, E. P. Godoy, Tayane W. L. Castilho, Fadir Salmen","doi":"10.1109/FMEC.2017.7946425","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.","PeriodicalId":426271,"journal":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Proposed model to implement high-level Information Security in Internet of Things\",\"authors\":\"S. D. Castilho, E. P. Godoy, Tayane W. L. Castilho, Fadir Salmen\",\"doi\":\"10.1109/FMEC.2017.7946425\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.\",\"PeriodicalId\":426271,\"journal\":{\"name\":\"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)\",\"volume\":\"107 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FMEC.2017.7946425\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC.2017.7946425","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proposed model to implement high-level Information Security in Internet of Things
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.