Proposed Model to Implement High-Level Information Security in Internet of Things
Autor(a) principal: | |
---|---|
Data de Publicação: | 2017 |
Outros Autores: | , , , |
Tipo de documento: | Artigo de conferência |
Idioma: | eng |
Título da fonte: | Repositório Institucional da UNESP |
Texto Completo: | http://hdl.handle.net/11449/164777 |
Resumo: | Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted. |
id |
UNSP_9191c5bee50d9d6c67904c5fbecfe725 |
---|---|
oai_identifier_str |
oai:repositorio.unesp.br:11449/164777 |
network_acronym_str |
UNSP |
network_name_str |
Repositório Institucional da UNESP |
repository_id_str |
2946 |
spelling |
Proposed Model to Implement High-Level Information Security in Internet of ThingsInternet of ThingsIoTInformation securityProtocolsInternet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted.Sao Paulo Technology College; Estacio de Sa College computer labs (Ourinhos, Brasil)FAESO, Estacio Sa Coll, Sch Elect & Control Engn, Ourinhos, BrazilSao Paulo State Univ, UNESP, Bauru Sch Engn, Bauru, BrazilSao Paulo Technol Coll, Ourinhos, BrazilSao Paulo State Univ, UNESP, Bauru Sch Engn, Bauru, BrazilIeeeFAESOUniversidade Estadual Paulista (Unesp)Sao Paulo Technol CollCastilho, Sergio DuqueGodoy, Eduardo P. [UNESP]Castilho, Tayane W. L. [UNESP]Salmen, FadirIEEE2018-11-26T17:56:03Z2018-11-26T17:56:03Z2017-01-01info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObject165-1702017 Second International Conference On Fog And Mobile Edge Computing (fmec). New York: Ieee, p. 165-170, 2017.http://hdl.handle.net/11449/164777WOS:000411731700026Web of Sciencereponame:Repositório Institucional da UNESPinstname:Universidade Estadual Paulista (UNESP)instacron:UNESPeng2017 Second International Conference On Fog And Mobile Edge Computing (fmec)info:eu-repo/semantics/openAccess2024-06-26T20:11:08Zoai:repositorio.unesp.br:11449/164777Repositório InstitucionalPUBhttp://repositorio.unesp.br/oai/requestopendoar:29462024-08-05T19:25:51.871998Repositório Institucional da UNESP - Universidade Estadual Paulista (UNESP)false |
dc.title.none.fl_str_mv |
Proposed Model to Implement High-Level Information Security in Internet of Things |
title |
Proposed Model to Implement High-Level Information Security in Internet of Things |
spellingShingle |
Proposed Model to Implement High-Level Information Security in Internet of Things Castilho, Sergio Duque Internet of Things IoT Information security Protocols |
title_short |
Proposed Model to Implement High-Level Information Security in Internet of Things |
title_full |
Proposed Model to Implement High-Level Information Security in Internet of Things |
title_fullStr |
Proposed Model to Implement High-Level Information Security in Internet of Things |
title_full_unstemmed |
Proposed Model to Implement High-Level Information Security in Internet of Things |
title_sort |
Proposed Model to Implement High-Level Information Security in Internet of Things |
author |
Castilho, Sergio Duque |
author_facet |
Castilho, Sergio Duque Godoy, Eduardo P. [UNESP] Castilho, Tayane W. L. [UNESP] Salmen, Fadir IEEE |
author_role |
author |
author2 |
Godoy, Eduardo P. [UNESP] Castilho, Tayane W. L. [UNESP] Salmen, Fadir IEEE |
author2_role |
author author author author |
dc.contributor.none.fl_str_mv |
FAESO Universidade Estadual Paulista (Unesp) Sao Paulo Technol Coll |
dc.contributor.author.fl_str_mv |
Castilho, Sergio Duque Godoy, Eduardo P. [UNESP] Castilho, Tayane W. L. [UNESP] Salmen, Fadir IEEE |
dc.subject.por.fl_str_mv |
Internet of Things IoT Information security Protocols |
topic |
Internet of Things IoT Information security Protocols |
description |
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses the technologies used in devices, the risks to which these devices are exposed to stay directly connect to a global network, the TCP/IP Network Layers Model that is used in this connection. The main objective of this paper is to propose an implementation models of security based on ISO 7498-2 for residential and industrial use in IoT. Mitigate risk is a major job for users of this technology because all Internet-connected device runs the risk of having their availability or integrity data transmitted corrupted. |
publishDate |
2017 |
dc.date.none.fl_str_mv |
2017-01-01 2018-11-26T17:56:03Z 2018-11-26T17:56:03Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/conferenceObject |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
2017 Second International Conference On Fog And Mobile Edge Computing (fmec). New York: Ieee, p. 165-170, 2017. http://hdl.handle.net/11449/164777 WOS:000411731700026 |
identifier_str_mv |
2017 Second International Conference On Fog And Mobile Edge Computing (fmec). New York: Ieee, p. 165-170, 2017. WOS:000411731700026 |
url |
http://hdl.handle.net/11449/164777 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
2017 Second International Conference On Fog And Mobile Edge Computing (fmec) |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
165-170 |
dc.publisher.none.fl_str_mv |
Ieee |
publisher.none.fl_str_mv |
Ieee |
dc.source.none.fl_str_mv |
Web of Science reponame:Repositório Institucional da UNESP instname:Universidade Estadual Paulista (UNESP) instacron:UNESP |
instname_str |
Universidade Estadual Paulista (UNESP) |
instacron_str |
UNESP |
institution |
UNESP |
reponame_str |
Repositório Institucional da UNESP |
collection |
Repositório Institucional da UNESP |
repository.name.fl_str_mv |
Repositório Institucional da UNESP - Universidade Estadual Paulista (UNESP) |
repository.mail.fl_str_mv |
|
_version_ |
1808129066871554048 |