Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 79

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

79 страница из 122

In this section, the paper projects the varied security challenges with respect to IoT domains. The usual attack method includes negotiating original IoT devices and perform counterfeit activities toward some another network [11]. A broad overview of classification of security levels and IoT layered architecture are discussed in detail as below.

2.3.1 Classification of Security Levels

This fragment presents a classification of requirements related to IoT system security based on operational levels, namely, at the levels of Information, Access, as well as Functional [12].

2.3.1.1 At Information Level

The following security requirements should warrant in this level:

 Integrity: During data transmission, the received data should not have been altered.

 Anonymity: Hide the data source’s identity from the nonmember parties.

 Confidentiality: To exchange protected information, a straight forward association has been imposed among the gadgetry to avert third parties from fetching confidential data.

Правообладателям