Security Flaws in Wireless Sensor Networks and Authentication Procedures for Internet of Things

被引:1
作者
Irshad, Reyazur Rashid [1 ]
Shaman, Faisal [2 ]
Mehdi, Mohammed [1 ]
Islam, Asharul [3 ]
Rasool, Mohammad Ashiquee [3 ]
Khan, Imran Mohd [3 ]
Alattab, Ahmed Abdu [1 ]
Alnfrawy, Ehab Tawfeek [4 ,5 ]
Fatima, Kainat [6 ]
机构
[1] Najran Univ, Coll Sci & Arts, Dept Comp Sci, Najran 68341, Saudi Arabia
[2] Univ Tabuk, Univ Coll Tymma, Dept Comp Sci, Tabuk 47311, Saudi Arabia
[3] King Khalid Univ, Coll Comp Sci, Abha 62217, Saudi Arabia
[4] Al Azhar Univ, Fac Engn Girls, Dept Syst & Comp Engn, Cairo 11651, Egypt
[5] Sadat Acad, Dept Comp Sci & Informat Syst, Alexandria 21519, Egypt
[6] Magadh Univ, Dept Comp Sci, Bodh Gaya 823001, Bihar, India
关键词
Electronic Sensors; Internet of Things (IoT); Wireless Sensor Networks;
D O I
10.1166/jno.2023.3387
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) refers to a new paradigm in which everyday products and tools are networked and shared amongst people and other devices. As a result of the benefits it provides to homeowners in terms of convenience and efficiency, IoT technology is expected to become a critical component in the creation of smart homes. Integrity, authenticity, and confidentiality of the data sensed, gathered, and transferred by IoT items in smart homes provide additional security and privacy problems brought on by the application of the IoT model. Because of these issues, smart homes based on the Internet of Things are not secure and are susceptible to a wide variety of security threats. A comprehensive risk assessment should precede any security measures in order to identify and resolve any underlying concerns. Analytical representation based on assessing security issues shows that the suggested method reduces throughputs by 5-17%, latency by 0-0.08, and time by 1-3% compared to the FBC approach and the EESCFD method.
引用
收藏
页码:237 / 242
页数:6
相关论文
共 23 条
[1]  
Acla H.B., 2019, P 2019 IEEE 6 INT C, P1, DOI [10.1109/ICETAS48360.2019.9117387, DOI 10.1109/ICETAS48360.2019.9117387]
[2]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[3]   Managing Optical Sensor Data Security and Mitigating Data Variation in Real-Time Applications Using Fractional Analytical Method [J].
Alharbi, Abdullah ;
Shalaby, Ahmed ;
Mohamed, Abdallah A. .
JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2022, 17 (08) :1195-1206
[4]  
Ara Tabassum, 2018, International Journal of Communication Networks and Information Security, V10, P539
[5]   Line Detection of Power Transmission Network Using Multi Photoelectric Sensors and Its Robustness Under Interaction [J].
Geng, Peng ;
Liu, Yan .
JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2021, 16 (08) :1234-1242
[6]   Mobility management for IoT: a survey [J].
Ghaleb, Safwan M. ;
Subramaniam, Shamala ;
Zukarnain, Zuriati Ahmed ;
Muhammed, Abdullah .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
[7]   A node localization algorithm based on Voronoi diagram and support vector machine for wireless sensor networks [J].
Hao, Zhanjun ;
Dang, Jianwu ;
Yan, Yan ;
Wang, Xiaojuan .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (02)
[8]  
Keerthika M., 2021, Global Transitions Proceedings, V2, P362, DOI DOI 10.1016/J.GLTP.2021.08.045
[9]   Internet of things security: A top-down survey [J].
Kouicem, Djamel Eddine ;
Bouabdallah, Abdelmadjid ;
Lakhlef, Hicham .
COMPUTER NETWORKS, 2018, 141 :199-221
[10]   Light Weight Authentication Scheme for Smart Home IoT Devices [J].
Kumar, Vipin ;
Malik, Navneet ;
Singla, Jimmy ;
Jhanjhi, N. Z. ;
Amsaad, Fathi ;
Razaque, Abdul .
CRYPTOGRAPHY, 2022, 6 (03)