{"title":"物联网关键技术及相关安全挑战研究","authors":"Maryam Daud, Quratulain H. Khan, Y. Saleem","doi":"10.1109/ISWSN.2017.8250042","DOIUrl":null,"url":null,"abstract":"There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A study of key technologies for IoT and associated security challenges\",\"authors\":\"Maryam Daud, Quratulain H. Khan, Y. Saleem\",\"doi\":\"10.1109/ISWSN.2017.8250042\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.\",\"PeriodicalId\":390044,\"journal\":{\"name\":\"2017 International Symposium on Wireless Systems and Networks (ISWSN)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Symposium on Wireless Systems and Networks (ISWSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISWSN.2017.8250042\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWSN.2017.8250042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study of key technologies for IoT and associated security challenges
There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.