Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 81

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

81 страница из 122

It describes security requirements in terms of the following features:

 Resilience: Resilience provides IoT security during assaults and failures due to the provided network capabilities.

 Self-association: It indicates the system’s ability to adapt unaided to be viable while there is a failure of certain parts of the systems due to intermittent break down or malicious assaults.

2.3.2 Classification of IoT Layered Architecture

Other than the above mentioned security stages, it is indispensable to focus on the vulnerabilities and assaults for varied modes of communication. As discussed in [14], the IoT communication architecture can be categorized as (i) Edge-Layer, (ii) Access-Layer, and (iii) Application-Layers.

2.3.2.1 Edge Layer

It pertains to side channel assaults [15]. The objective of assaults is to reveal details of the scrutiny of adverse events like consumption of power, discharges pertinent to electricity, and transmittance time, with nodal points effectuating encryption policies. The consumptive power of the units is one of the major susceptibilities among easy guesses to decrypt secret keys. Here, assaults force IoT devices deplete battery or jam the communications.