Research on Defects and Countermeasures of Internet of Things Security Technology

Research output: Contribution to journalConference articlepeer-review

Abstract

This paper analyzes the necessity and combination of the two models, proposes the cloud computing-based IoT architecture, and studies the security threats faced by the application layer in the three-tier architecture of the Internet of Things based on the cloud computing platform. The cloud-based IoT security architecture. The method proposed in this paper can effectively improve the security of the Internet of Things application system.

Original languageEnglish
Article number032198
JournalIOP Conference Series: Earth and Environmental Science
Volume252
Issue number3
DOIs
StatePublished - 9 Jul 2019
Event2018 4th International Conference on Environmental Science and Material Application, ESMA 2018 - Xi'an, China
Duration: 15 Dec 201816 Dec 2018

Fingerprint

Dive into the research topics of 'Research on Defects and Countermeasures of Internet of Things Security Technology'. Together they form a unique fingerprint.

Cite this