.

Thursday, February 28, 2013

Internet of Things

Security Challenges
in the IP-based network of Things?
Tobias Heer? , Oscar Garcia-Morchon† , Ren´ Hummen? ,
e
Sye Loong Keoh† , Sandeep S. Kumar† , and Klaus Wehrle?
?

COMSYS Group, RWTH Aachen University, Germany
and † Philips Research, the Netherlands
{heer,hummen,wehrle}@cs.rwth-aachen.de,
{oscar.garcia,sye.loong.keoh,sandeep.kumar}@philips.com
Abstract. A direct description of the term lucre of Things refers
to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks. Although the tribute
needs are well-recognized in this domain, it is still not fully understood
how existing IP security protocols and architectures can be deployed. In
this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of
Things. First, we give an overview of the deployment set and general
security needs. We then present challenges and requirements for IP-based
security solutions and highlight speci?c technical limitations of standard
IP security protocols.

Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!


Keywords: Security, Internet of Things, IETF

1

Introduction

The Internet of Things (IoT) denotes the interconnection of highly heterogeneous
networked entities and networks following a number of communication patterns
much(prenominal) as: human-to-human (H2H), human-to-thing (H2T), thing-to-thing (T2T),
or thing-to-things (T2Ts). The term IoT was ?rst coined by the Auto-ID center [1] in 1999. Since then, the development of the underlying concepts has ever
increased its pace. Nowadays, the IoT presents a strong focusing of research with
various initiatives working on the (re)design, application, and use of standard
Internet technology in the IoT.
The introduction of IPv6 and web services as fundamental building blocks
for IoT applications [2] promises to bring a number of prefatory advantages including: (i) a homogeneous protocol ecosystem that allows simple...If you want to get a full essay, order it on our website: Ordercustompaper.com



If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment