Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 88

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

88 страница из 122

2.4.2.2 Protocol

Every time IoT data is available over the network, it should be “transmitted, prepared, as well as have them stored”. Innumerable procedures are applied for the interactions. They are characterized as “transmission and communication protocols”. “REST/HTTP, MQTT, CoAP, DDS, AMQP, XMPP, and JMS” are the some of the foremost protocols in addition “MQTT, AMQP, and XMPP” are cloud servers under communication, many types of IoT communication protocols acknowledged in MQTT protocol, etc [28]. MQTT is a M2M light weighted convention and it will work on minimum-bandwidth approach. CoAP enables an assailant to transmit a small UDP packet to a CoAP user and gets a bigger packet as response. In this manner, it is powerless against DDoS assaults. The cause is that the protocol itself does eliminate session management and encryption processing requirements. Both the “AMQP protocol and the XMPP protocol” hold read object spoofing weaknesses.

2.4.3 Data-Based Threats

Data securing methods consists of five qualities in terms of “confidentiality, integrity, availability, controllability, and non-repudiation”.

Правообладателям