Please use this identifier to cite or link to this item: https://sci.ldubgd.edu.ua/jspui/handle/123456789/5895
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBelej, O.I.-
dc.contributor.authorNestor, N.-
dc.contributor.authorПолотай, О.І.-
dc.contributor.authorSadeckii, J.-
dc.date.accessioned2019-11-06T12:25:11Z-
dc.date.available2019-11-06T12:25:11Z-
dc.date.issued2019-
dc.identifier.urihttp://hdl.handle.net/123456789/5895-
dc.description.abstractThis article discusses the vulnerabilities and complexity of designing secure IoT-solutions, and then presents proven approaches to protecting devices and gateways. Specifically, security mechanisms such as device authentication (including certificate-based authentication), device authentication, and application a verification of identification are described. The authors consider a protocol of message queue telemetry transport for speech and sensor networks on the Internet, its features, application variants, and characteristic procedures. The principle of "publisher-subscriber" is considered. An analysis of information elements and messages is carried out. The urgency of the theme is due to the rapid development of "publisher-subscriber" architecture, for which the protocol is most characteristic.uk
dc.publisherLviv Polytechnic National Universityuk
dc.subjectprotocol, messages, protecting devices, authentication, sensor networks, datauk
dc.titleFeatures of application of data transmission protocols in wireless networks of sensorsuk
Appears in Collections:2019

Files in This Item:
File Description SizeFormat 
Paper_79.pdfФахова стаття703.24 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.