Latest 2022 Research Review on Industrial IoT Anomaly Detection Technology

Latest 2022 Research Review on Industrial IoT Anomaly Detection Technology

This article surveys the differences in various anomaly detection methods and their applicability to the security protection of the Industrial Internet of Things (IIoT). It analyzes papers published from 2000 to 2021 on network anomaly detection, summarizes the security threats faced by IIoT, and categorizes 9 types of network anomaly detection methods and their characteristics. … Read more

Design of Maintenance Key Based on Bluetooth Low Energy Technology

Design of Maintenance Key Based on Bluetooth Low Energy Technology

2016 Microcomputer and Applications Issue 18 Authors: Shen Yi, Chen Zhangjin, Zhang Hongbin, Wu Zhiguo Abstract: This paper proposes a design for a maintenance key based on Bluetooth Low Energy technology to address the issues faced by enterprises using traditional keys to manage key cabinets, such as centralized management and poor security. The system uses … Read more

CoAP: The Next Protocol Vulnerable to DDoS Attacks

CoAP: The Next Protocol Vulnerable to DDoS Attacks

Click the blue text to follow us with one click “ Dream Thinker NetworkSecurity Guardian ” Security researchers indicate that RFC 7252, also known as the Constrained Application Protocol (CoAP), is about to become one of the most abused protocols in DDoS attacks. What is CoAP? CoAP was officially approved in 2014 and has only … Read more

Analysis of Risks in MQTT Protocol Interfaces

Analysis of Risks in MQTT Protocol Interfaces

xxhzz @PortalLab Lab 1. Introduction to MQTT Protocol MQTT is a “lightweight” communication protocol based on the publish/subscribe model, built on the TCP/IP protocol. It is lightweight, open, simple, and designed to be easy to implement, making these features particularly suitable for constrained environments such as machine-to-machine (M2M) and Internet of Things (IoT) environments. Publish/Subscribe … Read more