2020
DOI: 10.3390/s20092609
|View full text |Cite
|
Sign up to set email alerts
|

Realizing Efficient Security and Privacy in IoT Networks

Abstract: In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 56 publications
(91 reference statements)
0
12
0
Order By: Relevance
“…A crypto hash algorithm-based blockchain technology was developed by [33,34] to manage and secure the decentralized distributed ledger of oil and gas product distribution across the country. The secure hash algorithm-1 (SHA-1) technique was used in the database security against any alteration from chain participants and to render assistance of immutability and transparency in the chain.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A crypto hash algorithm-based blockchain technology was developed by [33,34] to manage and secure the decentralized distributed ledger of oil and gas product distribution across the country. The secure hash algorithm-1 (SHA-1) technique was used in the database security against any alteration from chain participants and to render assistance of immutability and transparency in the chain.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They concluded that as the country develops, the risk of obesity among the less fortunate should be expected. The authors in ( 37 ) proposed a customized recommender system fashioned to meet the nutritional restrictions, preferences, and expectations of the user. The conducted by the authors of ( 38 ) recommended a diet plan to patients with jaundice using a hierarchy process that considers vital nutrients to determine the best choice for meals for all times of the day.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy at the physical layer have become a serious challenge in recent years for numerous communication technologies, including the internet of things (IoT) and, most notably, the coming fifth-generation (5G) cellular network. Joseph Henry Anajemba et al investigated an efficient sequential convex estimation optimization technique to overcome this difficulty and improve physical layer security in a three-node wireless communication network Anajemba et al (2020). IoT networks are typically comprised of a network of interconnected sensors and information relaying units that communicate in real-time with one another.…”
Section: Computer Sciencementioning
confidence: 99%