The Information Security for the Application of IoT Technology
Jia Jiang () and
Donghai Yang ()
Additional contact information
Jia Jiang: Hebei University of Science and Technology
Donghai Yang: Hebei University of Science and Technology
A chapter in LISS 2014, 2015, pp 1687-1693 from Springer
Abstract:
Abstract With the wide use of IoT technology in the production and daily life, the problems of information security and privacy security have been gradually exposed. Based on the IoT technology architecture, we made a deep analysis of the security problems from the sensor layer, network layer and application layer respectively, and we try to find the key technical points and put forward the corresponding countermeasures and suggestions for the security problems in the above three layers, for example, the security problems of the terminal access mechanism and the routing attacks of wireless sensor networks for the sensor layer; the address space shortage and the denial of service due to network congestion for the network layer; personal privacy and unsound security standard for the application layer.
Keywords: IoT technology; Information security; Personal privacy; Countermeasures and suggestions (search for similar items in EconPapers)
Date: 2015
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-662-43871-8_243
Ordering information: This item can be ordered from
http://www.springer.com/9783662438718
DOI: 10.1007/978-3-662-43871-8_243
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().