![]() ![]() ![]() The first challenge we tackle is the identification of common principles to define a generic approach to compare IoT protocol stack. In this survey, we describe a generic approach with twofold challenges. ![]() From this assessment, we identify the need to provide a homogeneous formalism applying to every IoT protocols. These security issues are challenging because IoT protocols are heterogeneous, suit different needs, and are used in different application domains. The Internet of things (IoT) is rapidly growing, and many security issues relate to its wireless technology. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |