Podrobná bibliografie
| Název: |
Data security in smart devices: Advancement, constraints and future recommendations. |
| Autoři: |
Wenhua, Zhang, Kamrul Hasan, Mohammad, Ismail, Ahmad Fadzil, Yanke, Zhang, Razzaque, Md Abdur, Islam, Shayla, Anil kumar, Budati |
| Zdroj: |
IET Networks (Wiley-Blackwell); Nov2023, Vol. 12 Issue 6, p269-281, 13p |
| Témata: |
DATA security, COMPUTER network protocols, COMPUTER network security, SECURITY systems, DATA security failures, DATA privacy, SMART devices, COMPUTER networks |
| Abstrakt: |
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers 'excitement for network technology and high‐tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications' dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high‐quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed. [ABSTRACT FROM AUTHOR] |
|
Copyright of IET Networks (Wiley-Blackwell) is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Databáze: |
Complementary Index |