Wireless security and privacy, best practices and design techniques [Book Reviews]

IEEE Network ◽  
2003 ◽  
Vol 17 (4) ◽  
pp. 6-7 ◽  
Author(s):  
J. Nikolaidis
Author(s):  
Ellen D. Hoadley ◽  
Justin Deibel ◽  
Colleen Kistner ◽  
Pamela Rice ◽  
Sandeep Sokhey

This paper develops an interdisciplinary model of data security and privacy effectiveness that blends the information hierarchy model with the principles of the Toyota production system. An application of the blended model is applied in the healthcare setting to evaluate its external validity. The usability and external validity of the model provide a preliminary set of best practices to improve organizational leverage of strategic planning and implementation of security and privacy safeguards. Its contributions include model development with real-world application and interdisciplinary bases.


2020 ◽  
Vol 12 (14) ◽  
pp. 5542 ◽  
Author(s):  
Isha Batra ◽  
Sahil Verma ◽  
Arun Malik ◽  
Kavita ◽  
Uttam Ghosh ◽  
...  

Lately, the Internet of Things (IoT) has opened up new opportunities to business and enterprises; however, the cost of providing security and privacy best practices is preventing numerous organizations from adopting this innovation. With the proliferation of connecting devices in IoT, significant increases have been recorded in energy use, harmful contamination and e-waste. A new paradigm of green IoT is aimed at designing environmentally friendly protocols by reducing the carbon impact and promote efficient techniques for energy use. There is a consistent effort of designing distinctive security structures to address vulnerabilities and attacks. However, most of the existing schemes are not energy efficient. To bridge the gap, we propose the hybrid logical security framework (HLSF), which offers authentication and data confidentiality in IoT. HLSF uses a lightweight cryptographic mechanism for unique authentication. It enhances the level of security and provides better network functionalities using energy-efficient schemes. With extensive simulation, we compare HLSF with two existing popular security schemes, namely, constrained application protocol (CoAP) and object security architecture for IoT (OSCAR). The result shows that HLSF outperforms CoAP and OSCAR in terms of throughput with low computational, storage and energy overhead, even in the presence of attackers.


Sign in / Sign up

Export Citation Format

Share Document