Towards a Wireless Connected World: Achievements and New Technologies 2022
DOI: 10.1007/978-3-031-04321-5_5
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 61 publications
0
1
0
Order By: Relevance
“…However, there is no better way to deal with data redundancy on the chain than reducing the size of the shards to improve the efficiency of traceability data transfers, which is both a strength and a weakness of distributed ledgers. The main transmission methods by which data is compromised are network hijacking and transmission congestion [ 27 ].…”
Section: Background Of Food Safetymentioning
confidence: 99%
“…However, there is no better way to deal with data redundancy on the chain than reducing the size of the shards to improve the efficiency of traceability data transfers, which is both a strength and a weakness of distributed ledgers. The main transmission methods by which data is compromised are network hijacking and transmission congestion [ 27 ].…”
Section: Background Of Food Safetymentioning
confidence: 99%