Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Secure Edge Communications Over the IoT

Version 1 : Received: 31 January 2024 / Approved: 1 February 2024 / Online: 1 February 2024 (04:27:56 CET)

How to cite: Plageras, A.; Stergiou, C.L.; Psannis, K. Secure Edge Communications Over the IoT. Preprints 2024, 2024020020. https://doi.org/10.20944/preprints202402.0020.v1 Plageras, A.; Stergiou, C.L.; Psannis, K. Secure Edge Communications Over the IoT. Preprints 2024, 2024020020. https://doi.org/10.20944/preprints202402.0020.v1

Abstract

The world has changed. New technologies, new trends, new protocols, new efficient algorithms, and systems have been used widely by civilized countries to have better and more convenient living. In this research, there have been introduced many new terms, technologies, and mechanisms. Moreover, threats, attacks, and vulnerabilities have been studied and a novel scenario has been proposed in order to overcome all these violations that have been presented in this paper. The scenario is based on a security model that has been proposed for critical sectors, such as hospitals, industries, etc., which need efficient solutions to go one step further and improve the secure and efficient living and treatment of people. The aim of this research has been to understand through research the IoT security issues and propose the appropriate solutions based on the most suitable security algorithms. The results, which have been based on the complexity, the throughput, the power consumption, the strength, and the memory usage of the algorithms studied, have been hopeful and helpful for future research and experimentation.

Keywords

Algorithms; IoT; Big Data Privacy; Cyber-Security; Edge Computing; Healthcare; Threats; Vulnerabilities

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.