2016
DOI: 10.17485/ijst/2016/v9i24/96108
|View full text |Cite
|
Sign up to set email alerts
|

Necessity and Expectation for an Identification Scheme in IoT Service: Cases in South Korea

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…According to Cisco predictions, there will be approximately 50 billion devices connected to the Internet by 2020 [4]. In this respect, we can say that there is a big demand for IoT applications since IoT has a wide range of applications such as intelligent transportation systems, smart home and building automation, medical and health systems, industrial management, energy systems, environment and infrastructure monitoring [5,6,7,8]. For understanding of IoT applications, IoT systems need to be divided into small components in view of tasks [2].…”
Section: Introductionmentioning
confidence: 99%
“…According to Cisco predictions, there will be approximately 50 billion devices connected to the Internet by 2020 [4]. In this respect, we can say that there is a big demand for IoT applications since IoT has a wide range of applications such as intelligent transportation systems, smart home and building automation, medical and health systems, industrial management, energy systems, environment and infrastructure monitoring [5,6,7,8]. For understanding of IoT applications, IoT systems need to be divided into small components in view of tasks [2].…”
Section: Introductionmentioning
confidence: 99%
“…With the emergence of the new environments, core assets of firms have informationized. However, in their convergence with IT, the industrial secrets that should be protected safely have more leaked to competitive firms or overseas 1,2 . A security system had mostly responded to such threats as virus and hacking.…”
Section: Introductionmentioning
confidence: 99%