Data security in smart devices: Advancement, constraints and future recommendations
Security through obscurity
IoT Security
Computer Networks and Communications
Network Access Control
TK5101-6720
02 engineering and technology
Dependability
Cryptographic protocol
Characterization and Detection of Android Malware
Computer security
computer network security
Cloud computing security
0202 electrical engineering, electronic engineering, information engineering
Cloud computing
data privacy
cryptography
Software engineering
Information security
Internet of Things and Edge Computing
Security and Privacy
Network security
smart phones
Computer science
Network Security
Operating system
Security service
Computer Science
Physical Sciences
Signal Processing
Telecommunication
Network Intrusion Detection and Defense Mechanisms
Cryptography
Security Analysis
Network security policy
Security information and event management
Confidentiality
DOI:
10.1049/ntw2.12091
Publication Date:
2023-06-24T04:46:35Z
AUTHORS (7)
ABSTRACT
AbstractNetwork security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high‐quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (63)
CITATIONS (7)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....