![]() Recently, a lot of smart sensor nodes and objects are interconnected and co-operated via the Internet protocol. IoT (The Internet of Things) is widespread, ubiquitous and becoming realized in the real world. ![]() In this chapter, we analyzed security challenges and threats based on smart home network under IoT service. As high and low efficient equipment are merged into heterogeneous infrastructure, IoT communication surroundings has become more complex, Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. This may induce vulnerable features to unauthorized and outside attacker over internet protocol, Bluetooth, Wi-Fi, and so forth. Most of information in internet of things is weak against attack. Most of communication is fully inter-connected with conventional techniques at point to point and end to application in general. They are inter-connected with optimized open system interconnection protocol over internet, wireless and wire medium. Many different types of object and devices are embedded in sensor node. Internet of things is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. ![]() The representative application is internet of things services and applications. As new technologies are developed and enhanced with conventional techniques, a lot of new application is emerged and merged with previous mechanism and skills. It consists of individual skill and technique. Conventional technology is mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. ![]() A lot of communication are developed and advanced with different and heterogeneous communication techniques by integration of wireless and wire connection. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |