An overview of the methods proposed to secure the internte
Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 408
This Paper With 9 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ICNTLS01_002
تاریخ نمایه سازی: 29 بهمن 1398
Abstract:
The expansion of current wireless networks and devices has enhanced the devel-opment of Internet of Things. In recent years, there has been a rapid development in mobile technologies that has led to a new variety of new mobile devices and social networks in addition to expanding the integration of IoT services. Many of these developments depend on applications of location-based services or loca-tion-based services. Currently, IoT applications are growing and expanding sig-nificantly. Examples include smart home, smart city, medical care and smart sur-veillance.One of the major challenges of these networks is flexibility. Internet of Things has two fundamental problems. These include privacy and security violations. In this study, the proposed methods for securing Internet objects such as methods for error tolerance, privacy and authentication are examined
Keywords:
Authors
Ali Kooshari
M.Sc., Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran
Mehdi Fartash
Assistant Professor, Department of Computer Engineering, Arak Branch, Islamic Azad Uni-versity, Arak, Iran