This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.Security objectives in any network mostly include authentication and secure data transmission. Traditional networks solve these matters by applying the corresponding cryptographic protocols and by having access to the corresponding amount of resources (for accomplishing this task).
The WoT brings into discussion the “smart objects” – these are object can interact with other objects in two ways: physical and virtual (by using the virtual computing components present in WoT).
The smart objects are based on simple interactions with Internet services
These objects pose constraints with respect to the security mechanisms; they demand lightweight protocols that must achieve the same objectives as in traditional IP networks....