2023
DOI: 10.1109/jsen.2022.3216824
|View full text |Cite
|
Sign up to set email alerts
|

Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges, and Future Research Directions

Abstract: County (UMBC)ScholarWorks@UMBC digital repository on the Maryland Shared Open Access (MD-SOAR) platform.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 129 publications
0
2
0
Order By: Relevance
“…Privacy and Security: In H-IoT, the privacy and security of patients and their data are paramount as any compromise could result in severe consequences (i.e., loss of command and control of a cobot arm used for precision surgeries may lead to its malfunctioning causing harms to person, property, loss of availability could lead to healthcare service disruption leaving critical patients who may need immediate attention vulnerable, loss of integrity would risk patients to wrong diagnosis or medication, loss of confidentiality would lead to loss of privacy, digital identity frauds, deep fakes, biohacking issues, etc.). In many cases, H-IoT uses heterogeneous networks to communicate and store data, exposing it to attack over long distances [268]. Thus, the security and privacy of data require anomaly detection, mitigation, robust encryption, and authentication techniques as mentioned in section VII-B.…”
Section: B Challengesmentioning
confidence: 99%
“…Privacy and Security: In H-IoT, the privacy and security of patients and their data are paramount as any compromise could result in severe consequences (i.e., loss of command and control of a cobot arm used for precision surgeries may lead to its malfunctioning causing harms to person, property, loss of availability could lead to healthcare service disruption leaving critical patients who may need immediate attention vulnerable, loss of integrity would risk patients to wrong diagnosis or medication, loss of confidentiality would lead to loss of privacy, digital identity frauds, deep fakes, biohacking issues, etc.). In many cases, H-IoT uses heterogeneous networks to communicate and store data, exposing it to attack over long distances [268]. Thus, the security and privacy of data require anomaly detection, mitigation, robust encryption, and authentication techniques as mentioned in section VII-B.…”
Section: B Challengesmentioning
confidence: 99%
“…The metaverse is gradually transitioning from a conceptual idea to a tangible reality as various technologies continue to advance. These technologies include wearable sensors [17], non-fungible tokens (NFTs) [18], augmented reality (AR) [19][20][21], 5G connectivity [16,[22][23][24], DTs [3], blockchain [25][26][27], virtual reality (VR) [28,29], brain-computer interfaces [30], and artificial intelligence (AI) [31]. This progression has sparked global interest, leading major technology firms like "Meta" (formerly Facebook), Microsoft, Tencent, and NVIDIA to invest in its development [32].…”
Section: Introductionmentioning
confidence: 99%
“…In [8,9], the authors discussed the most relevant studies associated with semisupervised approaches that, in general, use label data for anomaly detection in different applications. The authors have noted that while the trained model generally performs well in detecting anomalies, it sometimes struggles to identify new ones during the testing phase.…”
Section: Introductionmentioning
confidence: 99%