ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securing M2M Communication in IOT Devices

Journal: International Journal of Electrical, Electronics & Computer Science Engineering (Vol.4, No. 2)

Publication Date:

Authors : ;

Page : 17-20

Keywords : Internet of Things; Protocols; Ethernet; Encryption; Sensor; HTTP; CoAP; TLS.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Constrained devices are units for limited assets for example, CPU, primary memory (ROM and RAM), Also battery existence. These units frequently all the work similarly as sensors gathering information, machine with machine or keen gadgets controlling electrical appliances and administrations. At these gadgets connected to a network and they turn into known as “things” Also get to be and only the “Internet about Things” (IoT). IoT gadgets need aid associated with those web should consider those accumulation and return about information for web servers Also cloud information centres.Security may be defined as the protection of data from unauthorized impedance or monitoring by ensuring confidentiality, integrity of data and also authenticity.

Last modified: 2021-05-31 00:04:19