V. Bansal, Siddharth Pandey, Surendra Kumar Shukla, Devendra Singh, Sunitha Aravind Rathod, J. L. Arias-Gonzáles
{"title":"成功实施物联网网络的安全攻击框架、问题分类和配置策略","authors":"V. Bansal, Siddharth Pandey, Surendra Kumar Shukla, Devendra Singh, Sunitha Aravind Rathod, J. L. Arias-Gonzáles","doi":"10.1109/IC3I56241.2022.10073429","DOIUrl":null,"url":null,"abstract":"The IEEE 802.15.4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while collecting IoT based nodes is critical since it impacts safety and also impacts network speed. In this paper, a network security approach takes collection and recommended risks into account, taking into account the dynamics of cyber threat & total efficiency. The model findings show that the concept may select the best secure protocols depending on cybersecurity risks, level of maintenance, and changeable energy gathered. When compared to conventional methods, the proposed solution can increase work hours, resulting in enhanced network quality. Furthermore, the proposed security setup technique may suit a wide range of service needs.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation\",\"authors\":\"V. Bansal, Siddharth Pandey, Surendra Kumar Shukla, Devendra Singh, Sunitha Aravind Rathod, J. L. Arias-Gonzáles\",\"doi\":\"10.1109/IC3I56241.2022.10073429\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IEEE 802.15.4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while collecting IoT based nodes is critical since it impacts safety and also impacts network speed. In this paper, a network security approach takes collection and recommended risks into account, taking into account the dynamics of cyber threat & total efficiency. The model findings show that the concept may select the best secure protocols depending on cybersecurity risks, level of maintenance, and changeable energy gathered. When compared to conventional methods, the proposed solution can increase work hours, resulting in enhanced network quality. Furthermore, the proposed security setup technique may suit a wide range of service needs.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10073429\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10073429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation
The IEEE 802.15.4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while collecting IoT based nodes is critical since it impacts safety and also impacts network speed. In this paper, a network security approach takes collection and recommended risks into account, taking into account the dynamics of cyber threat & total efficiency. The model findings show that the concept may select the best secure protocols depending on cybersecurity risks, level of maintenance, and changeable energy gathered. When compared to conventional methods, the proposed solution can increase work hours, resulting in enhanced network quality. Furthermore, the proposed security setup technique may suit a wide range of service needs.