ЗАХИСТ ІНФОРМАЦІЇ В МЕРЕЖІ ІНТЕРНЕТУ РЕЧЕЙ НА ОСНОВІ REST API
Ключові слова:
REST API, Захист інформації,Анотація
Огляд, проблеми захисту інформації в Інтернеті речей. Розгляд запропонованих рішень на даний момент та їх порівняння. Запропонування модифікованого методу, який покращує рівень захисту інформації в Інтернеті речей.
Security of information on the Internet of Things based on REST API
Overview, problems of protection of information in the Internet of Things. Consideration of proposed solutions at the moment and their comparison. A modified method is proposed that improves the level of protection of information on the Internet of Things.
Посилання
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84.
“REST API for Oracle Internet of Things Cloud Service”, docs.oracle.com/en/cloud/paas/iot-cloud/iotrq/QuickStart.html.
Wu, F., Xu, L., Kumari, S., & Li, X. (2017). “A privacy-preserving and provable user authentication scheme for wireless sensor networks.
Ayoade, G., El-Ghamry, A., Karande, V., Khan, L., Alrahmawy, M., & Rashad, M. Z. (2018). Secure data processing for IoT middleware systems. The Journal of Supercomputing, 1-26.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2020 Максим Сергійович Безвугляк, Василь Васильович Курдеча
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.