Security Challenges and Approaches in Internet of ThingsSystem Model for the Internet of Things
Security Challenges and Approaches in Internet of Things: System Model for the Internet of Things
Misra, Sridipta; Maheswaran, Muthucumaru; Hashmi, Salman
2016-09-04 00:00:00
[The phrase “Internet of Things” was coined about 10 years ago by the founders of the original MIT Auto-ID Center, Kevin Ashton in 1999 and David L. Brock in 2001 [212], who envisioned “a world in which all electronic devices are networked and every object, whether it is physical or electronic, is electronically tagged with information pertinent to that object.” They envisioned use of physical tags that allow remote, contactless interrogation of their contents; thus, enabling all physical objects to act as nodes in a networked physical world. Realization of this vision will yield benefits in diverse areas including supply chain management and inventory control, product tracking and location identification, and human-computer and human-object interfaces [200]. Several technologies drive the IoT’s vision.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/security-challenges-and-approaches-in-internet-of-things-system-model-RZDjOeUE2r
Security Challenges and Approaches in Internet of ThingsSystem Model for the Internet of Things
[The phrase “Internet of Things” was coined about 10 years ago by the founders of the original MIT Auto-ID Center, Kevin Ashton in 1999 and David L. Brock in 2001 [212], who envisioned “a world in which all electronic devices are networked and every object, whether it is physical or electronic, is electronically tagged with information pertinent to that object.” They envisioned use of physical tags that allow remote, contactless interrogation of their contents; thus, enabling all physical objects to act as nodes in a networked physical world. Realization of this vision will yield benefits in diverse areas including supply chain management and inventory control, product tracking and location identification, and human-computer and human-object interfaces [200]. Several technologies drive the IoT’s vision.]
Published: Sep 4, 2016
Keywords: Virtual World; Smart Grid; Network Neutrality; Human Mediation; Standard Communication Protocol
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.