Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective
Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security...
Gespeichert in:
Veröffentlicht in: | IEEE access 2023-01, Vol.11, p.1-1 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 11 |
creator | Ashok, Kanneboina Gopikrishnan, S. |
description | Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers & network designers are required to test & validate multiple security models for their deployments. Due to which, the cost&time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, & route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking. |
doi_str_mv | 10.1109/ACCESS.2023.3234632 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2023_3234632</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10007827</ieee_id><doaj_id>oai_doaj_org_article_f705c83ca5c44fa996042a35c77e8468</doaj_id><sourcerecordid>2763817727</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</originalsourceid><addsrcrecordid>eNpNUU1PGzEQXVWtVAT8AnqwVKm3BH9_HNM0QCQQqIGz5XhnU0e7cWo7SPn3GBYh5jKjmXnvjeY1zQXBU0KwuZzN54vVakoxZVNGGZeMfmlOKJFmwgSTXz_V35vznLe4hq4toU6aw6q4EnIJ3vVotnP9MYeMYof-whALoBtwffmH7uIulJjCboN-uwwtWsZHtAJ_SKEc67SFPqNf6A_s-3gcYFcy6lIckEMPyW2GKuHRA6S8B1_CM5w13zrXZzh_z6fN09XicX4zub2_Xs5ntxPPsSkTIbzBVHSEc2IIw1isvdOSs5Zwr6gxQHhH8BrWrWRGc-6kN1wr7YU0TKzZabMcedvotnafwuDS0UYX7Fsjpo11qd7Wg-0UFl4z74TnvHPGSMypY8IrBZpLXbl-jlz7FP8fIBe7jYdUP5YtVZJpohRVdYuNWz7FnBN0H6oE21e77GiXfbXLvttVUT9GVACATwiMla6kL2kJj68</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2763817727</pqid></control><display><type>article</type><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Ashok, Kanneboina ; Gopikrishnan, S.</creator><creatorcontrib>Ashok, Kanneboina ; Gopikrishnan, S.</creatorcontrib><description>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers & network designers are required to test & validate multiple security models for their deployments. Due to which, the cost&time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, & route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3234632</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Attacks ; Blockchain ; Blockchains ; Business metrics ; Complexity ; Computational modeling ; Cryptography ; Data ; Data models ; Design ; Empirical analysis ; Energy ; Energy consumption ; Internet of Things ; IoT ; Machine learning ; Medical services ; medical signal detection ; Monitoring ; Network latency ; Network security ; Optimization ; Performance measurement ; Physical ; Privacy ; QoS ; Quality of service ; Remote monitoring ; Route ; Security ; Signal detection ; Statistical analysis</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</citedby><cites>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</cites><orcidid>0000-0001-9082-9012 ; 0000-0002-6162-7486</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10007827$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2101,27632,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Ashok, Kanneboina</creatorcontrib><creatorcontrib>Gopikrishnan, S.</creatorcontrib><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective</title><title>IEEE access</title><addtitle>Access</addtitle><description>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers & network designers are required to test & validate multiple security models for their deployments. Due to which, the cost&time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, & route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</description><subject>Attacks</subject><subject>Blockchain</subject><subject>Blockchains</subject><subject>Business metrics</subject><subject>Complexity</subject><subject>Computational modeling</subject><subject>Cryptography</subject><subject>Data</subject><subject>Data models</subject><subject>Design</subject><subject>Empirical analysis</subject><subject>Energy</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Machine learning</subject><subject>Medical services</subject><subject>medical signal detection</subject><subject>Monitoring</subject><subject>Network latency</subject><subject>Network security</subject><subject>Optimization</subject><subject>Performance measurement</subject><subject>Physical</subject><subject>Privacy</subject><subject>QoS</subject><subject>Quality of service</subject><subject>Remote monitoring</subject><subject>Route</subject><subject>Security</subject><subject>Signal detection</subject><subject>Statistical analysis</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1PGzEQXVWtVAT8AnqwVKm3BH9_HNM0QCQQqIGz5XhnU0e7cWo7SPn3GBYh5jKjmXnvjeY1zQXBU0KwuZzN54vVakoxZVNGGZeMfmlOKJFmwgSTXz_V35vznLe4hq4toU6aw6q4EnIJ3vVotnP9MYeMYof-whALoBtwffmH7uIulJjCboN-uwwtWsZHtAJ_SKEc67SFPqNf6A_s-3gcYFcy6lIckEMPyW2GKuHRA6S8B1_CM5w13zrXZzh_z6fN09XicX4zub2_Xs5ntxPPsSkTIbzBVHSEc2IIw1isvdOSs5Zwr6gxQHhH8BrWrWRGc-6kN1wr7YU0TKzZabMcedvotnafwuDS0UYX7Fsjpo11qd7Wg-0UFl4z74TnvHPGSMypY8IrBZpLXbl-jlz7FP8fIBe7jYdUP5YtVZJpohRVdYuNWz7FnBN0H6oE21e77GiXfbXLvttVUT9GVACATwiMla6kL2kJj68</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Ashok, Kanneboina</creator><creator>Gopikrishnan, S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9082-9012</orcidid><orcidid>https://orcid.org/0000-0002-6162-7486</orcidid></search><sort><creationdate>20230101</creationdate><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective</title><author>Ashok, Kanneboina ; Gopikrishnan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Attacks</topic><topic>Blockchain</topic><topic>Blockchains</topic><topic>Business metrics</topic><topic>Complexity</topic><topic>Computational modeling</topic><topic>Cryptography</topic><topic>Data</topic><topic>Data models</topic><topic>Design</topic><topic>Empirical analysis</topic><topic>Energy</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Machine learning</topic><topic>Medical services</topic><topic>medical signal detection</topic><topic>Monitoring</topic><topic>Network latency</topic><topic>Network security</topic><topic>Optimization</topic><topic>Performance measurement</topic><topic>Physical</topic><topic>Privacy</topic><topic>QoS</topic><topic>Quality of service</topic><topic>Remote monitoring</topic><topic>Route</topic><topic>Security</topic><topic>Signal detection</topic><topic>Statistical analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ashok, Kanneboina</creatorcontrib><creatorcontrib>Gopikrishnan, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ashok, Kanneboina</au><au>Gopikrishnan, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers & network designers are required to test & validate multiple security models for their deployments. Due to which, the cost&time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, & route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3234632</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-9082-9012</orcidid><orcidid>https://orcid.org/0000-0002-6162-7486</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2023-01, Vol.11, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2023_3234632 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Attacks Blockchain Blockchains Business metrics Complexity Computational modeling Cryptography Data Data models Design Empirical analysis Energy Energy consumption Internet of Things IoT Machine learning Medical services medical signal detection Monitoring Network latency Network security Optimization Performance measurement Physical Privacy QoS Quality of service Remote monitoring Route Security Signal detection Statistical analysis |
title | Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T06%3A41%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Statistical%20Analysis%20of%20Remote%20Health%20Monitoring%20Based%20IoT%20Security%20Models%20&%20Deployments%20from%20a%20Pragmatic%20Perspective&rft.jtitle=IEEE%20access&rft.au=Ashok,%20Kanneboina&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3234632&rft_dat=%3Cproquest_cross%3E2763817727%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2763817727&rft_id=info:pmid/&rft_ieee_id=10007827&rft_doaj_id=oai_doaj_org_article_f705c83ca5c44fa996042a35c77e8468&rfr_iscdi=true |