Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 46

2.4.3.2 Availability

Оглавление

In the IoT network, because of assuring the availability, heaps of data can be transmitted successfully and dependably. As the system data is running, it can be effectively read. When the system is negotiated, instantaneously resolve such conditions, to improve performance. The routing data swapped can be counterfeit or altered when there is a fake attack of route. Replay attack [24] infers that the assailant directs a packet that the destination has acknowledged to complete spoofing the system; its target is to terminate the user authentication. This type of replay assault is tough to compete with regardless of how it is encoded.

Industrial Internet of Things (IIoT)

Подняться наверх