A Comprehensive Integrated Security Model with Advanced Access Control for Enhancing WSN Computing in IoT Frameworks

Wireless Sensor Network (WSN) Computing has emerged as a pivotal intermediary process addressing latency challenges inherent in Cloud-oriented Internet of Things (IoT) services. However, this advancement brings forth significant security and privacy concerns exacerbated by the proliferation of netwo...

Full description

Saved in:
Bibliographic Details
Main Authors: Navaneethan S., Arun A.
Format: Article
Language:English
Published: Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek 2025-01-01
Series:Tehnički Vjesnik
Subjects:
Online Access:https://hrcak.srce.hr/file/478031
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Wireless Sensor Network (WSN) Computing has emerged as a pivotal intermediary process addressing latency challenges inherent in Cloud-oriented Internet of Things (IoT) services. However, this advancement brings forth significant security and privacy concerns exacerbated by the proliferation of network nodes and the vast volumes of real-time data generated within IoT frameworks. To mitigate these issues, this research proposes an Integrated Security Model with Advanced Access Control (ISM-AAC) Mechanism. The ISM-AAC integrates Functional Encryption (FE) and Role-Based Access Control (RBAC) to fortify communication security. The model employs a comprehensive approach encompassing Access Control Processes, Integrated Encryption Processes, and Re-Encryption Processes to enhance data confidentiality and integrity. The detailed framework includes phases such as system initialization, user management, and access permission administration, ensuring robust security throughout data transactions. Evaluation of the model's efficacy is conducted based on various security metrics pertinent to WSN computing environments. This study contributes to the advancement of secure computing in IoT by proposing a sophisticated ISM-AAC framework that not only addresses current security challenges but also anticipates future threats in the landscape of WSN computing. The findings underscore the model's effectiveness in safeguarding sensitive IoT data and lay the groundwork for future enhancements in IoT security protocols.
ISSN:1330-3651
1848-6339