2019
DOI: 10.3390/s19122797
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Constructing a Secure Domain of Sensor Nodes

Abstract: Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its lifecycle. Considering the mostly limited resources of IoT devices connected by wireless networks and their dynamic placement in unsupervised or even hostile environments, security is a complex and considerable issue. In this paper, a framework which encompasse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Reference [5] presents a framework for contrasting a secure domain of sensor nodes. The authors wanted to integrate some security measures to build a secure environment in a WSN.…”
Section: Summary Of the Special Issuementioning
confidence: 99%
“…Reference [5] presents a framework for contrasting a secure domain of sensor nodes. The authors wanted to integrate some security measures to build a secure environment in a WSN.…”
Section: Summary Of the Special Issuementioning
confidence: 99%
“…This section briefly discusses existing studies [17][18][19][20][21][22][23][24][25] designed to secure patient data in the EMR and highlights their drawbacks.…”
Section: Related Existing Researchmentioning
confidence: 99%
“…They used wearable sensors to collect patient data and used a mobile device to send and store these data in the medical repository (cloud server). Finally, Furtak et al [25] designed a framework based on RSA-2048 bits and trusted modules to secure the sensors' domain and prevent unauthorized threats. They organized sensors into master, replica, and gateway categories in the network area and data structure in the sensor memory.…”
Section: Related Existing Researchmentioning
confidence: 99%
See 2 more Smart Citations