LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things

Author(s):  
P. Urien
2015 ◽  
Vol 9 (16) ◽  
pp. 3083-3094 ◽  
Author(s):  
Xin Huang ◽  
Paul Craig ◽  
Hangyu Lin ◽  
Zheng Yan

2017 ◽  
Vol 9 (3) ◽  
pp. 27 ◽  
Author(s):  
Xiruo Liu ◽  
Meiyuan Zhao ◽  
Sugang Li ◽  
Feixiong Zhang ◽  
Wade Trappe

2013 ◽  
Vol 671-674 ◽  
pp. 3223-3226 ◽  
Author(s):  
Ning Hong

This paper proposed a security framework for the internet of things based on Public Key Infrastructure (PKI) which aims to answer these questions that how to solve the security problem in the internet of things between the client operation and service operation. It illustrates the model by presenting a modified security framework for a variety of applications than traditional PKI framework. Our aim is to show the new security framework in the internet of things that the traditional internet network does not have.


2020 ◽  
Vol 19 ◽  

The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows the protection of both constrained and unconstrained IoT devices through robust encryption as wellas authentication so that both can equally leverage from the same security framework, but still maintaining lowcomputational loads, by avoiding excessive computational operations.


Author(s):  
K. Ravikumar ◽  
S. Ramesh Praksh

Remote correspondence systems are exceedingly inclined to security dangers. The actual uses of remote correspondence systems come in military, business, medicinal services, retail, furthermore, transportations. These frameworks utilize wired, cell, or adhoc systems. Our methodology depends upon vitality mindful types of the IoT application's plan in the BIP (Behavior, Interaction, Priority) segment system. This takes into account a nitty gritty formal portrayal of the framework's conduct and its resulting approval, consequently giving input to improvements in the pre-arrangement or pre-creation stages. The structure and advancement of a property security framework, in light of human movement identification and remotely checking innovation, to affirm guest personality and to manage Door openness has been accounted for in this paper. This paper portrays in regards to the execution and sending of remote control framework and openness directly into a property situation for confirmed individuals because it were. A PIR movement sensor and Camera module are utilized to identify movement and catch pictures separately are dedicatedly make the security framework alive as per the solicitation. Electromagnetic entryway lock module work the entryway openness, has been structured and created.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


Sign in / Sign up

Export Citation Format

Share Document