IoT (Internet of Things) based Solution Trend Identification and Analysis Research
Author
Abstract

IoT shares data with other things, such as applications, networked devices, or industrial equipment. With a large-scale complex architecture de-sign composed of numerous ‘things’, the scalability and reliability of various models stand out. When these advantages are vulnerable to security, constant problems occur continuously. Since IoT devices are provided with services closely to users, it can be seen that there are many users with various hacking methods and environments vulnerable to hacking.

Year of Publication
2022
Date Published
aug
URL
https://ieeexplore.ieee.org/document/9900777
DOI
10.1109/BCD54882.2022.9900777
Google Scholar | BibTeX | DOI