{"title":"“在物联网设备中提供数据真实性的安全架构”","authors":"Shivangi, Gulishta Khan, S. Ninoria","doi":"10.1109/SMART55829.2022.10047067","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"“Secure Architecture for Providing Data Authenticity in IoT Enabled Devices”\",\"authors\":\"Shivangi, Gulishta Khan, S. Ninoria\",\"doi\":\"10.1109/SMART55829.2022.10047067\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.\",\"PeriodicalId\":431639,\"journal\":{\"name\":\"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMART55829.2022.10047067\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART55829.2022.10047067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
“Secure Architecture for Providing Data Authenticity in IoT Enabled Devices”
The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.