SECURITY ISSUES THAT WILL DOMINATE IN IOT CLOSEST FUTURE
Ключові слова:
IoT, security, problemsАнотація
Питання безпеки, які домінуватимуть у найближчому майбутньому в IoT
The Internet of Things (IoT) will face multiple threats over the next few years. Due to Given large amount of private information, providing information security on the shared data is an important issue that cannot be neglected. In this article, we begin with general information about next topics new DNS issue, insufficient certification in public-key and cryptosystems.
Посилання
Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, Shiuhpyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities”, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, (DOI: 10.1109/SOCA.2014.58), 17-19 Nov. 2014, p.5.
Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh “Emerging Security Threats and Countermeasures in IoT ”. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security Feb. 2015, Pages 1-6.
Mung Chiang “Fog and IoT: An Overview of Research Opportunities”, IEEE Internet of Things Journal, Volume: 3, Issue: 6, Dec. 2016, pp. 854 – 864.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2019 Alexander Vladimirovich Radchuk, Dmitry Anatolyevich Minochkin
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.