Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security Challenges and Approaches in Internet of ThingsSystem Model for the Internet of Things

Security Challenges and Approaches in Internet of Things: System Model for the Internet of Things [The phrase “Internet of Things” was coined about 10 years ago by the founders of the original MIT Auto-ID Center, Kevin Ashton in 1999 and David L. Brock in 2001 [212], who envisioned “a world in which all electronic devices are networked and every object, whether it is physical or electronic, is electronically tagged with information pertinent to that object.” They envisioned use of physical tags that allow remote, contactless interrogation of their contents; thus, enabling all physical objects to act as nodes in a networked physical world. Realization of this vision will yield benefits in diverse areas including supply chain management and inventory control, product tracking and location identification, and human-computer and human-object interfaces [200]. Several technologies drive the IoT’s vision.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Security Challenges and Approaches in Internet of ThingsSystem Model for the Internet of Things

Loading next page...
 
/lp/springer-journals/security-challenges-and-approaches-in-internet-of-things-system-model-RZDjOeUE2r
Publisher
Springer International Publishing
Copyright
© The Author(s) 2017
ISBN
978-3-319-44229-7
Pages
5 –17
DOI
10.1007/978-3-319-44230-3_2
Publisher site
See Chapter on Publisher Site

Abstract

[The phrase “Internet of Things” was coined about 10 years ago by the founders of the original MIT Auto-ID Center, Kevin Ashton in 1999 and David L. Brock in 2001 [212], who envisioned “a world in which all electronic devices are networked and every object, whether it is physical or electronic, is electronically tagged with information pertinent to that object.” They envisioned use of physical tags that allow remote, contactless interrogation of their contents; thus, enabling all physical objects to act as nodes in a networked physical world. Realization of this vision will yield benefits in diverse areas including supply chain management and inventory control, product tracking and location identification, and human-computer and human-object interfaces [200]. Several technologies drive the IoT’s vision.]

Published: Sep 4, 2016

Keywords: Virtual World; Smart Grid; Network Neutrality; Human Mediation; Standard Communication Protocol

There are no references for this article.