TY - JOUR
T1 - Research on Defects and Countermeasures of Internet of Things Security Technology
AU - Lin, Jie
N1 - Publisher Copyright:
© 2019 IOP Publishing Ltd. All rights reserved.
PY - 2019/7/9
Y1 - 2019/7/9
N2 - This paper analyzes the necessity and combination of the two models, proposes the cloud computing-based IoT architecture, and studies the security threats faced by the application layer in the three-tier architecture of the Internet of Things based on the cloud computing platform. The cloud-based IoT security architecture. The method proposed in this paper can effectively improve the security of the Internet of Things application system.
AB - This paper analyzes the necessity and combination of the two models, proposes the cloud computing-based IoT architecture, and studies the security threats faced by the application layer in the three-tier architecture of the Internet of Things based on the cloud computing platform. The cloud-based IoT security architecture. The method proposed in this paper can effectively improve the security of the Internet of Things application system.
UR - https://www.scopus.com/pages/publications/85070448260
U2 - 10.1088/1755-1315/252/3/032198
DO - 10.1088/1755-1315/252/3/032198
M3 - 会议文章
AN - SCOPUS:85070448260
SN - 1755-1307
VL - 252
JO - IOP Conference Series: Earth and Environmental Science
JF - IOP Conference Series: Earth and Environmental Science
IS - 3
M1 - 032198
T2 - 2018 4th International Conference on Environmental Science and Material Application, ESMA 2018
Y2 - 15 December 2018 through 16 December 2018
ER -