Abstract
The ability to process large amounts of data with the integration of the Internet of Things (IoT) and cloud computing environments means organizations can trade sophisticated security estimation techniques for more accurate and simple models. By determining tactical and technical parameters of Cloud-of-Things (CoT) wireless equipment and systems, discovering irregularities of electronic tags and their threat levels and analyzing tags/readers strong and weak APs provide the interoperability for organizing and carrying out CoT defense. The basic task of the steady-state model for the CoT will be to support the defense for the CoT network through detecting technical loopholes and topographic structures from the various CoT networks and the data/information stored inside the system. The CoT system will possess a function of automatic identity recognition and needs a steady-state framework for measuring security components and mechanisms of computing devices, communication networks, and sensing devices.
Original language | English (US) |
---|---|
Title of host publication | Cyber Assurance for the Internet of Things |
Publisher | Wiley-IEEE Press |
Pages | 225-247 |
Number of pages | 23 |
ISBN (Electronic) | 9781119193784 |
ISBN (Print) | 9781119193869 |
DOIs | |
State | Published - Nov 7 2016 |
Keywords
- Automatic identity recognition
- Cloud artificial intelligence
- Cloud-of-things
- Communication networks
- Computing devices
- Internet of things
- Sensing devices
- Steady-state model
- System performance
ASJC Scopus subject areas
- General Computer Science