A Comprehensive Integrated Security Model with Advanced Access Control for Enhancing WSN Computing in IoT Frameworks
Wireless Sensor Network (WSN) Computing has emerged as a pivotal intermediary process addressing latency challenges inherent in Cloud-oriented Internet of Things (IoT) services. However, this advancement brings forth significant security and privacy concerns exacerbated by the proliferation of netwo...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek
2025-01-01
|
| Series: | Tehnički Vjesnik |
| Subjects: | |
| Online Access: | https://hrcak.srce.hr/file/478031 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Wireless Sensor Network (WSN) Computing has emerged as a pivotal intermediary process addressing latency challenges inherent in Cloud-oriented Internet of Things (IoT) services. However, this advancement brings forth significant security and privacy concerns exacerbated by the proliferation of network nodes and the vast volumes of real-time data generated within IoT frameworks. To mitigate these issues, this research proposes an Integrated Security Model with Advanced Access Control (ISM-AAC) Mechanism. The ISM-AAC integrates Functional Encryption (FE) and Role-Based Access Control (RBAC) to fortify communication security. The model employs a comprehensive approach encompassing Access Control Processes, Integrated Encryption Processes, and Re-Encryption Processes to enhance data confidentiality and integrity. The detailed framework includes phases such as system initialization, user management, and access permission administration, ensuring robust security throughout data transactions. Evaluation of the model's efficacy is conducted based on various security metrics pertinent to WSN computing environments. This study contributes to the advancement of secure computing in IoT by proposing a sophisticated ISM-AAC framework that not only addresses current security challenges but also anticipates future threats in the landscape of WSN computing. The findings underscore the model's effectiveness in safeguarding sensitive IoT data and lay the groundwork for future enhancements in IoT security protocols. |
|---|---|
| ISSN: | 1330-3651 1848-6339 |