Analysis of Security Mechanisms Based on Clusters IoT Environments

  • Gaona-García P
  • Montenegro-Marin C
  • Prieto J
  • et al.
N/ACitations
Citations of this article
65Readers
Mendeley users who have this article in their library.

Abstract

IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.

Cite

CITATION STYLE

APA

Gaona-García, P., Montenegro-Marin, C. E., Prieto, J. D., & Nieto, Y. V. (2017). Analysis of Security Mechanisms Based on Clusters IoT Environments. International Journal of Interactive Multimedia and Artificial Intelligence, 4(3), 55. https://doi.org/10.9781/ijimai.2017.438

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free