Version 1
: Received: 31 January 2024 / Approved: 1 February 2024 / Online: 1 February 2024 (04:27:56 CET)
How to cite:
Plageras, A.; Stergiou, C.L.; Psannis, K. Secure Edge Communications Over the IoT. Preprints2024, 2024020020. https://doi.org/10.20944/preprints202402.0020.v1
Plageras, A.; Stergiou, C.L.; Psannis, K. Secure Edge Communications Over the IoT. Preprints 2024, 2024020020. https://doi.org/10.20944/preprints202402.0020.v1
Plageras, A.; Stergiou, C.L.; Psannis, K. Secure Edge Communications Over the IoT. Preprints2024, 2024020020. https://doi.org/10.20944/preprints202402.0020.v1
APA Style
Plageras, A., Stergiou, C.L., & Psannis, K. (2024). Secure Edge Communications Over the IoT. Preprints. https://doi.org/10.20944/preprints202402.0020.v1
Chicago/Turabian Style
Plageras, A., Christos L. Stergiou and Konstantinos Psannis. 2024 "Secure Edge Communications Over the IoT" Preprints. https://doi.org/10.20944/preprints202402.0020.v1
Abstract
The world has changed. New technologies, new trends, new protocols, new efficient algorithms, and systems have been used widely by civilized countries to have better and more convenient living. In this research, there have been introduced many new terms, technologies, and mechanisms. Moreover, threats, attacks, and vulnerabilities have been studied and a novel scenario has been proposed in order to overcome all these violations that have been presented in this paper. The scenario is based on a security model that has been proposed for critical sectors, such as hospitals, industries, etc., which need efficient solutions to go one step further and improve the secure and efficient living and treatment of people. The aim of this research has been to understand through research the IoT security issues and propose the appropriate solutions based on the most suitable security algorithms. The results, which have been based on the complexity, the throughput, the power consumption, the strength, and the memory usage of the algorithms studied, have been hopeful and helpful for future research and experimentation.
Keywords
Algorithms; IoT; Big Data Privacy; Cyber-Security; Edge Computing; Healthcare; Threats; Vulnerabilities
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.