Research on Defects and Countermeasures of Internet of Things Security Technology

Jie Lin
DOI: https://doi.org/10.1088/1755-1315/252/3/032198
2019-01-01
Abstract:This paper analyzes the necessity and combination of the two models, proposes the cloud computing-based IoT architecture, and studies the security threats faced by the application layer in the three-tier architecture of the Internet of Things based on the cloud computing platform. The cloud-based IoT security architecture. The method proposed in this paper can effectively improve the security of the Internet of Things application system.
What problem does this paper attempt to address?