2021
DOI: 10.1109/access.2021.3088225
|View full text |Cite
|
Sign up to set email alerts
|

Sensor-Cloud Architecture: A Taxonomy of Security Issues in Cloud-Assisted Sensor Networks

Abstract: The orchestration of cloud computing with wireless sensor network (WSN), termed as sensor-cloud has recently gained remarkable attention from both the academia and industry. It enhances the processing and storage capabilities of the resources-constrained sensor networks in various applications such as healthcare, habitat monitoring, battlefield surveillance, and disaster management etc. The diverse nature of sensor network applications imposes processing and storage limitation on the sensor networks, which can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 98 publications
0
8
0
Order By: Relevance
“…The WSN security system includes physical network system security, security defense systems, data, and information security, attack detection, and attack patterns. Research related to security system constraints in WSN includes several aspects, including [20]- [24]:…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The WSN security system includes physical network system security, security defense systems, data, and information security, attack detection, and attack patterns. Research related to security system constraints in WSN includes several aspects, including [20]- [24]:…”
Section: Methodsmentioning
confidence: 99%
“…Alturki et al [24] studied the importance of securing the sensor-cloud architecture from various security attacks to maintain its integrity. The main components of a sensor-cloud architecture that can be attacked are:…”
Section: Wsn Security Systemsmentioning
confidence: 99%
“…All the beacon nodes forward the data, say (data_i) to all its intermediate nodes by calibrating the distance Dis_i with the speed spe_i by coordinated modes correspondingly. For communicating properly, the free space renovation model is utilized and hence the receiver model can be calculated mathematically in (4).…”
Section: Direct Trust Value Evaluationmentioning
confidence: 99%
“…In such commodity networks, transmitting quite a high quantity of data through the network ends up with variety of issues, including low QoS, i.e., delay, bottleneck, speed, and privacy. They have poor memory, computation, and network control, as well as an irreversible form of energy [4]. Several studies concentrate on providing an answer with efficient routing efficacy and network connectivity due to poor connectivity and restrictive limits of edge devices.…”
mentioning
confidence: 99%
“…Wireless sensor networks (WSNs) have become a ubiquitous technology in modern society, offering versatile communication platforms for various applications. These networks play a crucial role in fields such as monitoring, logistics, surveillance, smart homes, and healthcare [1], where ensuring high levels of security is paramount [2,3]. However, with the advancements in quantum technologies, many traditional security mechanisms employed in WSNs are at risk of being compromised.…”
Section: Introductionmentioning
confidence: 99%