Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 98

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

98 страница из 122

The IoT system is unprotected to various varieties of assaults. Currently, a substantial number of the assailant target IoT devices. For example, Mirai bot involves the IoT devices associated with the internet. Privacy, integrity, and accessibility should be protected in the IoT. Similar to this, the usage of cryptography stays elementary for safeguarding from assailants. Requirements for cyber-security are decisive in protecting the system from catastrophes. Futuristic explorations depend on execution upgrades and complex computation usage for security.

2.6 Security Analysis of IoT Platforms

Nowadays, IoT market considerably rises its growth as well as concurrently security subjects are also increases. Particularly, in IoT mechanism platforms, foremost stimulating task is about security. Some of the IoT mechanism platforms listed and labeled below [48, 49].

2.6.1 ARTIK

ARTIK is formed by Samsung and is a merged IoT stage. This stage integrates based on OCF confirmation novelty and IoT components, for example, “equipment, programming, cloud, security, and environment”. Still, it is an average based on cloud IoT stage that performs security methodology including data trade and confirmation. The “MQTT, CoAP, and Websocket” are augmented as the application convention. The AES and RSA cryptography calculations are endorsed for information privacy. Moreover, the ARTIK module contributes a cryptographic motor to encryption and decoding.

Правообладателям