Iot sensor networks security mechanisms/techniques

A Murtala Zungeru, JM Chuma, CK Lebekwe… - Green Internet of Things …, 2020 - Springer
A Murtala Zungeru, JM Chuma, CK Lebekwe, P Phalaagae, J Gaboitaolelwe, P Phalaagae…
Green Internet of Things Sensor Networks: Applications, Communication …, 2020Springer
In recent years, several efforts have been made by many researchers to emphasize security
issues in the IoT sensor network framework. It is evident from prior research that the area of
security and privacy has caught the attention of many researchers. Although the focus of this
chapter is to review recent research techniques and mechanisms to ensure IoT security,
some related works do not exclusively focus on security areas such as security and privacy
issues, and their solutions, in the IoT system architecture. This work aims to unearth …
Abstract
In recent years, several efforts have been made by many researchers to emphasize security issues in the IoT sensor network framework. It is evident from prior research that the area of security and privacy has caught the attention of many researchers. Although the focus of this chapter is to review recent research techniques and mechanisms to ensure IoT security, some related works do not exclusively focus on security areas such as security and privacy issues, and their solutions, in the IoT system architecture. This work aims to unearth research opportunities to address security issues and challenges. The contribution of this work focuses on providing a layered approach to propose solutions to layer security challenges using emerging technologies for securing sensor networks through mechanisms such as lightweight encryption, authentication trust recommendation, and secure cloud computing. The work presents recent trends in current research on securing IoT communication and applications concerning the IoT architecture. The study further gives insights on the need for convergence with several interdisciplinary technologies to improve the security of IoT through opportunities such as blockchain, machine learning, and the development of context-aware applications, IoP and IoE should be further investigated to review real-life examples and analysis of their effectiveness towards enhancing privacy and security in wireless IoT sensor networks.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果