Intelligent IoT Motes: Preventing Their Abuse at the Weakest Entry Point.
IEEE Design & Test（2019）
Editor-s note: This article from Intel Labs, presents security challenges for resource-constrained IoT devices. It points out that, due to the limited resource availability, IoT nodes could be the weakest security link in the massive IoT networks and presents current best-practices and future security needs for IoT devices.更多
Intelligent sensors,Encryption,Protocols,Logic gates,Network security,Internet of Things,Resource management,Best practices,Computer network management