Edge Centric IoT Security

Part 2 In the previous post(part 1), I explained what the strength and weakness of Data-Centric Security at IoT architecture. Now I’m going to inspect the “Edge” capability on the security point of view. An intelligent factor may be more involved in designing a security architecture with edge centrality. There are 4 sections for Edge-Centric …

Edge Centric IoT Security ادامه »

Researches and Studies