Rabah Kenaza, Ameur Khemane, H. Bendjenna, A. Meraoumia, Laimeche Lakhdar
{"title":"物联网(IoT):架构、应用和安全挑战","authors":"Rabah Kenaza, Ameur Khemane, H. Bendjenna, A. Meraoumia, Laimeche Lakhdar","doi":"10.1109/PAIS56586.2022.9946918","DOIUrl":null,"url":null,"abstract":"The Internet, a revolutionary invention that is constantly evolving, is always transforming into a new type of software and very small hardware which makes it inevitable in our daily use. The forms of communication are known as either human-human or human-machine, this paper presents an overview of the Internet of Things (IoT). It consists of four sections. The first section will describe the five-layer IoT architecture. The second section will address IoT applications. the Third section will indicate the security challenges in the relevant major IoT architecture layers. The last one will provide some solutions existing in the literature to deal with IoT security problems.","PeriodicalId":266229,"journal":{"name":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Internet of Things (IoT): Architecture, Applications, and Security Challenges\",\"authors\":\"Rabah Kenaza, Ameur Khemane, H. Bendjenna, A. Meraoumia, Laimeche Lakhdar\",\"doi\":\"10.1109/PAIS56586.2022.9946918\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet, a revolutionary invention that is constantly evolving, is always transforming into a new type of software and very small hardware which makes it inevitable in our daily use. The forms of communication are known as either human-human or human-machine, this paper presents an overview of the Internet of Things (IoT). It consists of four sections. The first section will describe the five-layer IoT architecture. The second section will address IoT applications. the Third section will indicate the security challenges in the relevant major IoT architecture layers. The last one will provide some solutions existing in the literature to deal with IoT security problems.\",\"PeriodicalId\":266229,\"journal\":{\"name\":\"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PAIS56586.2022.9946918\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAIS56586.2022.9946918","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things (IoT): Architecture, Applications, and Security Challenges
The Internet, a revolutionary invention that is constantly evolving, is always transforming into a new type of software and very small hardware which makes it inevitable in our daily use. The forms of communication are known as either human-human or human-machine, this paper presents an overview of the Internet of Things (IoT). It consists of four sections. The first section will describe the five-layer IoT architecture. The second section will address IoT applications. the Third section will indicate the security challenges in the relevant major IoT architecture layers. The last one will provide some solutions existing in the literature to deal with IoT security problems.