Method to provide secure operation of lighting network
A lighting network and security operation technology, applied in security devices, data exchange networks, digital transmission systems, etc., can solve problems such as network traffic congestion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The security of IoT devices in IoT systems, such as lighting devices in connected lighting systems, faces many open challenges. In particular, a common problem with IoT lighting devices is that they are often resource-constrained such that they do not contain the necessary computing resources to implement advanced security measures such as end-to-end encryption.
[0041] As mentioned, personal data collected using IoT lighting devices has value to data hackers and identity thieves. And, cyber-attacks targeting IoT solutions have the potential to cripple physical services and lighting infrastructure. In a home-based environment, due to a security breach, for example, a user may lose remote control of lighting in his / her home, communication and / or control signals for the lighting may be dropped and / or redirected to the wrong destination . In addition, lighting devices may start to behave in an abnormal manner, for example, suddenly lighting devices are powered on at ful...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


