Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 34

2.3.2.1 Edge Layer

Оглавление

It pertains to side channel assaults [15]. The objective of assaults is to reveal details of the scrutiny of adverse events like consumption of power, discharges pertinent to electricity, and transmittance time, with nodal points effectuating encryption policies. The consumptive power of the units is one of the major susceptibilities among easy guesses to decrypt secret keys. Here, assaults force IoT devices deplete battery or jam the communications.

Industrial Internet of Things (IIoT)

Подняться наверх