Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ullah, Inam | - |
dc.contributor.author | Noor, Asra | - |
dc.contributor.author | Nazir, Shah | - |
dc.contributor.author | Ali, Farhad | - |
dc.contributor.author | Ghadi, Yazeed Yasin | - |
dc.contributor.author | Aslam, Nida | - |
dc.date.accessioned | 2024-04-03T12:00:17Z | - |
dc.date.available | 2024-04-03T12:00:17Z | - |
dc.date.issued | 2024-03 | - |
dc.identifier.issn | 0920-8542 | - |
dc.identifier.issn | 1573-0484 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/90869 | - |
dc.description.abstract | The term "Internet of things (IoT)" refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT systems frequently use messaging protocols to exchange IoT data. IoT security must be established using advanced techniques as it is vulnerable to many threats. The primary objectives of IoT security are to protect customer privacy, data integrity, and confidentiality, as well as the security of assets and IoT devices and the accessibility of services provided by an IoT ecosystem. In this regard, the IoT must meet user demands while consuming the least number of resources, including money, vitality, and time. The proposed research work is organized into numerous categories to make it easier for researchers and readers to solve and understand security problems in IOT devices. The categories "Features" are identified from available literature, and a specific criterion is adopted for choosing alternatives. The entropy approach to determine criterion relevance by calculating features weights is utilized. The second method "EDAS" approach is used and the alternatives are sorted chronologically based on the criterion weights for easy identification and selection of an effective alternative. Finally, all alternatives are precisely analyzed and ranked. Using our research method, various appropriate features are extracted and are evaluated to solve security issue within IoT devices. The most significant features are ranked to help researchers and manufacturers to focus on security-related issues in IoT devices. | - |
dc.format.extent | 30 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | SPRINGER | - |
dc.title | Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features | - |
dc.type | Article | - |
dc.identifier.wosid | 001091939900003 | - |
dc.identifier.doi | 10.1007/s11227-023-05685-3 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SUPERCOMPUTING, v.80, no.5, pp 5870 - 5899 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85173766341 | - |
dc.citation.endPage | 5899 | - |
dc.citation.startPage | 5870 | - |
dc.citation.title | JOURNAL OF SUPERCOMPUTING | - |
dc.citation.volume | 80 | - |
dc.citation.number | 5 | - |
dc.type.docType | Article | - |
dc.publisher.location | 네델란드 | - |
dc.subject.keywordAuthor | Internet of things | - |
dc.subject.keywordAuthor | IoT device | - |
dc.subject.keywordAuthor | IoT security | - |
dc.subject.keywordAuthor | Security and privacy | - |
dc.subject.keywordAuthor | Networks | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | THINGS | - |
dc.subject.keywordPlus | TECHNOLOGY | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.