Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 27

2.2 Security Properties

Оглавление

Security is an inevitable issue that must be addressed in anything we do, anyplace we do, and whenever we do. There is a digital information about individuals and about what individuals do, what individuals talk, and where they go, and details about their arrangements and so on and so forth. What is more, with a plan to go ahead with IoT, the aggregates of this information will be augmented comprising sensitive data about user’s conducts and behaviors. So, it might lead to undesirable outcomes on account of unprotected information.

For data protection, the major concept is that of security policy—it combines several services like confidentiality, integrity, as well as accessibility. These notions collect the elementary security objectives for both data and computational services. Furthermore, authenticity, non-reputation, and then privacy are security services, too [10].

1 Confidentiality: This denotes protecting exchanged content acquired by IoT devices.

2 Integrity: When anticipated recipients must be able to verify if the exchanged things have been modified or not within themselves.

3 Availability: The data must be available to authorized parties at all point of time. Partial resources, functionalities, or other services produced or attained by the network may be endangered and it is not accessible within the peers of the network.

4 Authenticity: This indicates that the system is not accessed by unauthorized users. Authentication mechanism helps establishing proof of identities without which fabrication is possible.

5 Non-repudiation: It does not permit the sender of a specific message to refute the claim of not directing that message.

Industrial Internet of Things (IIoT)

Подняться наверх