Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
80 страница из 122
Privacy: During data transmission, sensitive information about the users should not be revealed.
2.3.1.2 At Access Level
This specifies security methodologies to control the access to the network.
Some of the functional abilities of Access level listed below:
Access control: Access control grants permission only for authorized users to access the IoT devices and the various network tasks.
Authentication: Authentication mechanism helps launch right identities in the IoT network. This is an important aspect in IoT network in order to cooperate with other devices [13]. The devices need to be provided with validation systems to avoid security dangers. For instance, for all the IoT gadgets from similar manufacturers that are configured with analogous confirmation accreditations, the hacking of one gadget may lead to violating security at the data level.
Authorization: Only authorized IoT devices can hold the right to use the network services or resources.