物联网解决方案架构中的挑战和安全威胁

Saloni Bansal, V. Tomar
{"title":"物联网解决方案架构中的挑战和安全威胁","authors":"Saloni Bansal, V. Tomar","doi":"10.1109/PARC52418.2022.9726660","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is only the next step in communication’s evolution. Physical items may be required to efficiently create, gather, and exchange data via the Internet of Things. Certain Internet of Things technologies strive to automate various tasks and allow inanimate physical things to function without the need for human contact. It gives users reliability and flexibility by moving data across a network without requiring any human-to-computer or human-to-human connection, but it also opens up a new world of possibilities. Security methods with the ability to manage several platforms while retaining the same level of security are of high quality. Being able to interact with a range of devices is essential. This article examines the primary issues that arise during the installation of the Internet of Things, as well as the numerous security dangers that exist in today’s world, and how to mitigate these security risks using a variety of ways.","PeriodicalId":158896,"journal":{"name":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Challenges & Security Threats in IoT with Solution Architectures\",\"authors\":\"Saloni Bansal, V. Tomar\",\"doi\":\"10.1109/PARC52418.2022.9726660\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is only the next step in communication’s evolution. Physical items may be required to efficiently create, gather, and exchange data via the Internet of Things. Certain Internet of Things technologies strive to automate various tasks and allow inanimate physical things to function without the need for human contact. It gives users reliability and flexibility by moving data across a network without requiring any human-to-computer or human-to-human connection, but it also opens up a new world of possibilities. Security methods with the ability to manage several platforms while retaining the same level of security are of high quality. Being able to interact with a range of devices is essential. This article examines the primary issues that arise during the installation of the Internet of Things, as well as the numerous security dangers that exist in today’s world, and how to mitigate these security risks using a variety of ways.\",\"PeriodicalId\":158896,\"journal\":{\"name\":\"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)\",\"volume\":\"113 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PARC52418.2022.9726660\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PARC52418.2022.9726660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

物联网(IoT)只是通信发展的下一步。物理物品可能需要通过物联网有效地创建、收集和交换数据。某些物联网技术努力实现各种任务的自动化,并允许无生命的物理物体在不需要人类接触的情况下运行。它通过在网络上移动数据而不需要任何人机或人与人之间的连接,为用户提供了可靠性和灵活性,但它也开辟了一个新的可能性世界。能够管理多个平台同时保持相同安全级别的安全方法是高质量的。能够与一系列设备进行交互是必不可少的。本文研究了物联网安装过程中出现的主要问题,以及当今世界存在的众多安全危险,以及如何使用各种方法减轻这些安全风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Challenges & Security Threats in IoT with Solution Architectures
The Internet of Things (IoT) is only the next step in communication’s evolution. Physical items may be required to efficiently create, gather, and exchange data via the Internet of Things. Certain Internet of Things technologies strive to automate various tasks and allow inanimate physical things to function without the need for human contact. It gives users reliability and flexibility by moving data across a network without requiring any human-to-computer or human-to-human connection, but it also opens up a new world of possibilities. Security methods with the ability to manage several platforms while retaining the same level of security are of high quality. Being able to interact with a range of devices is essential. This article examines the primary issues that arise during the installation of the Internet of Things, as well as the numerous security dangers that exist in today’s world, and how to mitigate these security risks using a variety of ways.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信