Securing M2M Communication in IOT Devices
Journal: International Journal of Electrical, Electronics & Computer Science Engineering (Vol.4, No. 2)Publication Date: 2017-04-30
Authors : Anurag Gupta Manish Verma;
Page : 17-20
Keywords : Internet of Things; Protocols; Ethernet; Encryption; Sensor; HTTP; CoAP; TLS.;
Abstract
Constrained devices are units for limited assets for example, CPU, primary memory (ROM and RAM), Also battery existence. These units frequently all the work similarly as sensors gathering information, machine with machine or keen gadgets controlling electrical appliances and administrations. At these gadgets connected to a network and they turn into known as “things” Also get to be and only the “Internet about Things” (IoT). IoT gadgets need aid associated with those web should consider those accumulation and return about information for web servers Also cloud information centres.Security may be defined as the protection of data from unauthorized impedance or monitoring by ensuring confidentiality, integrity of data and also authenticity.
Other Latest Articles
- Calculation of the normal modes of closed waveguides
- Two-way communication retrial queue with unreliable server and multiple types of outgoing calls
- Simulation of non-stationary event flow with a nested stationary component
- Numerical determination of the singularity order of a system of differential equations
- Verification of a labor market domain using an academic crowdsourcing system
Last modified: 2021-05-31 00:04:19