Information Technology Reference
In-Depth Information
IF(sensorn> array_ttsn[i])THEN
k++;
FSE
IF(k==m)THEN
ttsn[i]=(array_sensorn[1]+...+ array_sensorn[j])/j;
k=0;
FSE
FSE
4
Future Work
The IoT is a new paradigm in which Internet will be smartly supported by a great
number of smart embedded devices. There are some doubts about the capability of
current Internet to support a significant increase of the number of devices connected.
These and other challenges have motivated the networking community to ask if it is
time for redesign Internet [9].
One of the biggest challenges of IoT is guarantee to people that it won't cause se-
rious threats to their privacy [1]. A way to ensure node's privacy is introducing trust
management on IoT RFID systems.
In trust management, digital signature is a very useful technology that is used for
authentication and data exchange between different applications for a long time.
The use of cryptographic algorithms and protocols for digital signatures requires
storage resources that aren't available in RFID tags. A RFID authentication algorithm
must take into account the tag storage and computing power.
With tag information encoded uniformly, it is possible to maximize information
exchange and obtain a good conflict resolution technology, which will minimize data
interference. A good lightweight data privacy protection makes possible the protec-
tion of data privacy and location privacy [10].
Integrity and confidentiality of data and authentication of services and users are
crucial in an IoT system. Security has an immense relevance in IoT. Wireless net-
works can be a target to several attacks such as eavesdropping, spoofing, denial of
service and so on [2]. The IoT has on basis the current Internet, so the security prob-
lems of this Internet will also appear in IoT.
Wireless Sensor Networks have a dynamic network topology, and widely distri-
buted multi-hop wireless networks. This technology is known for its low cost, so in
consequence of this, WSNs have limited resources which leads to some network secu-
rity risks.
The perception layer is responsible for collecting information from the environ-
ment and it is data oriented. Researches made about security issues in WSNs focus on
data analysis, because it is in the process of collecting data that information is more
vulnerable to security attacks.
Search WWH ::




Custom Search