Affiliation:
1. Dept. of ECE, GCE, Bodinayakkanur, Theni, Tamilnadu, INDIA
Abstract
The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows the protection of both constrained and unconstrained IoT devices through robust encryption as wellas authentication so that both can equally leverage from the same security framework, but still maintaining lowcomputational loads, by avoiding excessive computational operations.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Computer Science Applications
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献