





Applications for Innovative Internet of Things Using Smart Surveillance System
Subscribe/Renew Journal
In the logistics and supply chain, the traditional supply of goods is based on established agreements between manufacturers and suppliers. Orders are made in advance and tracking is done by various stakeholders in the supply chain, i.e., assembly lines, manufacturers and logistics managers. With the use of smart technologies such as active RFID (executable codes in tag), it is possible to envision that goods may be transported without human intervention from manufacturers to suppliers. Warehouses will become completely automatic with goods moving in and out; forwarding of the goods will be made, using intelligent decisions based on information received via readers and positioning systems to optimise transiting routes The concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyses existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyse how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals. In this paper, the traditional techniques are studied and evaluated. Accordingly, analysis and design of innovative general purpose system, which protect the IoT resources such as devices and data against hacking or stealing, are proposed.
Keywords
Internet of Things, End-to-End Security, Network Security, QoS, Internetworking.
User
Subscription
Login to verify subscription
Font Size
Information

Abstract Views: 349

PDF Views: 4