IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

Security Metric for Information Network

Author(s): Saurabh Singhal* and Manju

Pp: 117-124 (8)

DOI: 10.2174/9789815049480124060011

* (Excluding Mailing and Handling)

Abstract

Given that dislodged working conditions are in play, system administrators are tasked with handling security solutions that, in turn, impact most of the working layers of the OSI model. This comprehensive approach depicts a situation in which the originator perceives that their data is traversing through a specified encryption process at every stage/layer, starting from the top layer (i.e., Application Layer) and gradually proceeding down to the last one (i.e., Physical Layer). Similarly, the decryption process takes place at every stage/layer at the destination end. 

© 2024 Bentham Science Publishers | Privacy Policy