One Secure IoT Scheme for Protection of True Nodes.

Yongkai Fan,Guanqun Zhao,Xiaodong Lin,Xiaofeng Sun,Dandan Zhu,Jing Lei
DOI: https://doi.org/10.1007/978-3-030-05755-8_15
2018-01-01
Abstract:As a new generation of information technologies, IoT has been applied into many industrial fields and made great contributions to our everyday life. However, vulnerability of IoT constrains the application of IoT, especially, when the node used in IoT systems is malicious one which may break the system and leakage vital data (for example, nodes used by patient to transfer condition data). To tackle the security concerning, we propose one secure IoT framework used to protect true nodes and ensure the secure operation. Firstly, we introduce two types of IoT classic architectures and summarize the security challenges, then we give an introduction and comparison of several IoT security frameworks. At last, we propose our scheme for protecting the safety of IoT nodes in the perception layer.
What problem does this paper attempt to address?