Security Challenges and Approaches in Internet of Things by Sridipta Misra Muthucumaru Maheswaran & Salman Hashmi
Author:Sridipta Misra, Muthucumaru Maheswaran & Salman Hashmi
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
Fig. 5.6The communications in HDPMS-PCSDs setup
Some of the benefits of the Policy Compliant Smart Devices are:Guaranty of security and privacy policy adherence by IoT devices.
Effective policy enforcement requires minimal user and administrator participation.
Few security and privacy incidents boost manufacturers’ reputation and product reliability.
5.2.3 HDPMS and PCSDs in Action
Figures 5.4 and 5.5 depict the workflows of a PCSD and a HDPMS, respectively, in a typical IoT environment. Figure 5.6 shows the major communications in the HDPMS–PCSDs setup. The functioning of the HDPMS-PCSD based IoT environment is described below.
Every PCSD would be considered as an aggregation of multiple functionalities. For example, a smartphone can be considered to be composed of functionalities like voice calling, text messaging, video recording, audio recording, media playing, and direction finding. Each functionality would have a standardized description. The manufacturers who wants to include any functionality in their devices, would have to assign that unique description to the functionality. For example, if the Functionality ID for media playing is, say PLAY_MEDIA, then every device incorporating this functionality would recognize the functionality by the same Functionality ID (PLAY_MEDIA).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(26277)
Hello! Python by Anthony Briggs(25205)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(24435)
Kotlin in Action by Dmitry Jemerov(23526)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(22869)
Dependency Injection in .NET by Mark Seemann(22658)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(21420)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(20258)
Grails in Action by Glen Smith Peter Ledbrook(19332)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17047)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(16357)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(14071)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(12245)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11520)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10637)
Hit Refresh by Satya Nadella(9212)
The Kubernetes Operator Framework Book by Michael Dame(8574)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8424)
Robo-Advisor with Python by Aki Ranin(8366)