New-Tech Magazine | August 2016 | Digital Edition

IoT Ÿ£¡¥ª ¯¡ª

ĄĀćüđćûđþÿø÷ü đüąăĐăĉ ďüąĐă účĀĂ IoT ĄĀďøúû ăĐÿćďÿćĀ÷û ĀøĀĂďø

ʸʡʩʸ ʣʰʩʥʥ ʸʷʩʩʡ ʯʬʸʠ

ʤ

š£›¨ IoT §£²›ž ¦³ ¢ª²¢ª£š ´Ÿ£Ÿª¨ žŸ ž³¡ ž²Ÿ³› Ÿ¨¬

šŸž ´Ÿ³¨ £¢²® ¡´®¨ ³²ª Ÿ ž³£œ›Ÿ £®²œŸ¢®£²± ¡´®¨ ¦¥ Ÿ¨¥ ©œŸ¨ ´Ÿ£ž¦ ›££¡ ²¡š data at ž¡Ÿª¨› §£ªŸ´ª› ²›Ÿ¨ ²³š¥ §ž›³ ©Ÿ³š²ž §£¦Ÿ±£³ ²®«¨§ª³£ rest §£ª«¡Ÿš¨ž žª¥Ÿ´ž £ªŸ´ª ´š ´¨š¦ ³£ Ÿ£¦š š³Ÿª ¦Ÿ¡´šž ©¨ › ´š ´Ÿ³¬¦Ÿ £ªŸ´ª £¨´ ´¨š¦ ³£ ¤³¨ž› «¡££´š §£ª«¡Ÿš¨ §£²£³¥¨ £ªŸ´ª ¦¥Ÿ ž²Ÿ°´ ¬°›¦ ©´£ª IoT ²£³¥¨ ££ ¦¬ §Ÿ›£¬ £ª®¦ ¤¦ž¨› ´Ÿ£´®Ÿ±´ §£ªŸ´ª ´Ÿ¨¦³ ´Ÿ±£› £Ÿ›£¥› ©¥Ÿ ž¦¬®ž ´¬› £¨´Ÿ ´Ÿ¦£¬®ž ²Ÿ›¬ §œ ¬°›´ž¦ ´Ÿ¥£²° ´Ÿ¨¦³ ´Ÿ±£› ¡£¢›ž¦ £¥ Ÿ›£¬› §£š°¨ªž §£ªŸ´ª ¤£¦ž´›Ÿ §£ªŸ´ª› ¡Ÿ¢›¦ ž£ž£ ©´£ª³ §Ÿ³£²Ÿ ²Ÿ®«£¨ £¥²¬› ³Ÿ¨£³ §ž¦³ £±³¨¨ £¥ ¡£¢›£ žª¥Ÿ´ž ²Ÿ›¬ §££Ÿ¡££ §¬ Ÿš²±££ APIs ) §£¨Ÿ³££ ´Ÿª¥´ £®£°®« API ¦ ±² §££Ÿ¡££ §£²¢¨²® ¦°®´ž¦ ¦Ÿ¥£ ¦Ÿ¡´šž ¤£¦ž´ ´Ÿ¨£š ²Ÿ£š› §œŸ¨³ £®¥ §£²®ª §£±¦¡ £ª³¦ ¦¬®Ÿ¨ ¡¢›Ÿš¨ ¦Ÿ¡´š ¤£¦ž´ ž¦£¡´ 4 ´¬›Ÿ±³ žª£¨šž ž¨²Ÿ®¢¦®ž ££ ¦¬ ¤£¦ž´ ²Ÿ±¨ž £°›± ¦³ ´Ÿ£¢ª´Ÿšž ´š ²´Ÿ£› ›Ÿ¢ž ©®Ÿš› ¬¨¢Ÿ¨ ´Ÿ¨£šž

§££Ÿ³¬ §£ªŸ´ªž §ž› §£ªŸ³ §£›°¨ ²Ÿ£š ¤£¦ž´›Ÿ ž¡Ÿª¨› ž¬Ÿª´› š°¨£ž¦ §£ªŸ´ªž ´Ÿ¨¦³ ©Ÿ²±¬ ±Ÿ²£® ´š œ£°¨ 2 Ÿ¨°¬ ³Ÿ¨£¨ž Ÿ«›¦Ÿ žª³¨ ´ŸªŸ²±¬¦ ©œž¦ £¥ ¦Ÿ¦¥¦ IoT ž ²£³¥¨ £Ÿ³¬ Ÿ´Ÿš Ÿ£ªŸ´ª ´Ÿ¨¦³ ¦¬ š¦³ žª£ž §£ªŸ´ªž ´Ÿ¨¦³› §œ® ´Ÿ¬¨³¨ §œ š¦š £Ÿš²¥ ¦¬®£ š¦ IoT ²£³¥¨³ ±² š¦ §²Ÿœ ££ ¦¬ ¦Ÿ°£ª¦ ²£³¥¨ž ´š ´®³Ÿ¡ ž°Ÿ²® ž¨²Ÿ®¢¦®¦ Ÿ´¥£®ž¦ ¤¥›Ÿ ž³²Ÿ¨ ´Ÿ²¡š ´Ÿ®±´ž Ÿš°££ žª¨¨ §£ªŸ´ªž ´Ÿ¨¦³ ´Ÿ¨£š¦ ž¦£œ²ž ž¢£³ž š²±ªž £¢¨´¨ §´£²Ÿœ¦š ´Ÿ¬°¨š› š£ž hash §´£²Ÿœ¦š šŸž SHA ²³š¥ hash ²´Ÿ£› £²š¦Ÿ®Ÿ®ž ¡¢›Ÿš¨ž §££Ÿª£³ £ª®¨ žªœž §£³²Ÿ ž¬Ÿª´› §£ªŸ´ª Ÿ¨°¬ ©³££¡ž¨ §£ªŸ´ªž ¦³ ²›¬¨ž ©¨ › ³¨´³ž¦ ©´£ª³ Ÿ¬› ©ª¬ ´££°±£¦®š ¦š ¬°›¦ ¦Ÿ¥£ ±Ÿ´ ©£Ÿ¬ §²Ÿœ hash ´±£ª¥¢› ž³£œ hash ´¦Ÿ¬® ²¡š¦ ž¬Ÿž› §££Ÿª£³ ´Ÿ¨¦³ ´±£›› ³Ÿ¨£³ š£ž ²´Ÿ£ ž± ¡ private key £¢²® ¡´®¨ §¬ §£ªŸ´ª ž ¡´®¨ 3 ²Ÿ£š› œ°Ÿ¨³ £®¥ ´Ÿ³¨ keyed - hash message š²±ª ²¡š¨Ÿ HMAC ) authentication code

¬£°ž¦ Ÿ¦¥Ÿ£ §£±«¬ ²³š¥ ´Ÿ³¡ ´Ÿ£±«¬ £Ÿ›£² ´š §¬ §£³œ²¨Ÿ §£³¡ §£´Ÿ²£³ §£²³Ÿ±¨ž §££±«¬ž §£«¥ªžŸ §£²£³¥¨ž ž³£œ §£›££¡¨ ¢ª²¢ª£š¦ §£¡Ÿ´®Ÿ IoT ¦ ž¡¢›š ¦Ÿ¨ ž¡¢›š¦ žª£¨šŸ ´£ª®± šŸž ›² ©¨ ²›¥ ³Ÿ¨£³› š°¨ª³ ž ¥ §££ ¥²¨ž §£›£¥²ž CIA triad ¦³ ¦Ÿ¨ž ¦¬ §£««Ÿ›¨ 1 «¨ ²Ÿ£š ž ¦Ÿ¨› §£ªŸ´ª ´Ÿ¨¦³ confidentiality ´Ÿ£Ÿ« availability §´Ÿª£¨ Ÿ integrity ) £²£³¥¨ ´Ÿ£¢²® ¦¬ žªœž¦ ž›Ÿ³¡ ´Ÿ£Ÿ«ž §£ª«¡Ÿš¨ž §£ªŸ´ª¦ ´¬œŸª ´Ÿ¨¦³ IoT ž ´Ÿ³£œª¦ ž²Ÿ³± ´Ÿª£¨ ³ Ÿ¬› §£²£³¥¨› §£¢›£ž› ±¨´£ ž ²¨š¨ ²£³¥¨ž ¦³ §£ªŸ´ªž ´Ÿ¨¦³ ´²£¨³ ¦³ IoT ©±´ž £ªŸ´ª ¦¬ §£›³Ÿ¡ Ÿªš ²³š¥ §£¥£²° Ÿªš §£ªŸ´ª ²³¨ž ©³££¡ ´¨œŸ §£²°Ÿ£¨ž §£ªŸ´ªž ¦¬ ±² š¦ ›Ÿ³¡¦ ¦¬ §œ š¦š Ÿ³Ÿ¨£³› §£š°¨ª Ÿš Ÿ£ ¦¬ ´š §£¦¦Ÿ¥ž §¨°¬ Ÿ¦³ ´Ÿª¥´ž £ªŸ´ª ž²Ÿ°´ ¦³ §£²¢¨²® žª¥Ÿ´ž £›£¥² ¦¥ ¤£¦ž´ ´š ´Ÿ¡ªž¦ £¥ ž¦¬®žž ´¥²¬¨Ÿ ž³Ÿ¦³ ¦Ÿ±³¦ £š¥ §£ªŸ´ªž ´Ÿ¨¦³

New-Tech Magazine l 58

Made with