Abstract
Given that dislodged working conditions are in play, system administrators
are tasked with handling security solutions that, in turn, impact most of the working
layers of the OSI model. This comprehensive approach depicts a situation in which the
originator perceives that their data is traversing through a specified encryption process
at every stage/layer, starting from the top layer (i.e., Application Layer) and gradually
proceeding down to the last one (i.e., Physical Layer). Similarly, the decryption process
takes place at every stage/layer at the destination end.
About this chapter
Cite this chapter as:
Saurabh Singhal, Manju ;Security Metric for Information Network, IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications Advances in Computing Communications and Informatics (2024) 6: 117. https://doi.org/10.2174/9789815049480124060011
DOI https://doi.org/10.2174/9789815049480124060011 |
Print ISSN 2737-5722 |
Publisher Name Bentham Science Publisher |
Online ISSN 2737-5730 |