Please use this identifier to cite or link to this item:
https://sci.ldubgd.edu.ua/jspui/handle/123456789/5895
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Belej, O.I. | - |
dc.contributor.author | Nestor, N. | - |
dc.contributor.author | Полотай, О.І. | - |
dc.contributor.author | Sadeckii, J. | - |
dc.date.accessioned | 2019-11-06T12:25:11Z | - |
dc.date.available | 2019-11-06T12:25:11Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5895 | - |
dc.description.abstract | This article discusses the vulnerabilities and complexity of designing secure IoT-solutions, and then presents proven approaches to protecting devices and gateways. Specifically, security mechanisms such as device authentication (including certificate-based authentication), device authentication, and application a verification of identification are described. The authors consider a protocol of message queue telemetry transport for speech and sensor networks on the Internet, its features, application variants, and characteristic procedures. The principle of "publisher-subscriber" is considered. An analysis of information elements and messages is carried out. The urgency of the theme is due to the rapid development of "publisher-subscriber" architecture, for which the protocol is most characteristic. | uk |
dc.publisher | Lviv Polytechnic National University | uk |
dc.subject | protocol, messages, protecting devices, authentication, sensor networks, data | uk |
dc.title | Features of application of data transmission protocols in wireless networks of sensors | uk |
Appears in Collections: | 2019 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Paper_79.pdf | Фахова стаття | 703.24 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.