Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective

Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2023-01, Vol.11, p.1-1
Hauptverfasser: Ashok, Kanneboina, Gopikrishnan, S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 11
creator Ashok, Kanneboina
Gopikrishnan, S.
description Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative & qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers & network designers are required to test & validate multiple security models for their deployments. Due to which, the cost&time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, & route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.
doi_str_mv 10.1109/ACCESS.2023.3234632
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2023_3234632</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10007827</ieee_id><doaj_id>oai_doaj_org_article_f705c83ca5c44fa996042a35c77e8468</doaj_id><sourcerecordid>2763817727</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</originalsourceid><addsrcrecordid>eNpNUU1PGzEQXVWtVAT8AnqwVKm3BH9_HNM0QCQQqIGz5XhnU0e7cWo7SPn3GBYh5jKjmXnvjeY1zQXBU0KwuZzN54vVakoxZVNGGZeMfmlOKJFmwgSTXz_V35vznLe4hq4toU6aw6q4EnIJ3vVotnP9MYeMYof-whALoBtwffmH7uIulJjCboN-uwwtWsZHtAJ_SKEc67SFPqNf6A_s-3gcYFcy6lIckEMPyW2GKuHRA6S8B1_CM5w13zrXZzh_z6fN09XicX4zub2_Xs5ntxPPsSkTIbzBVHSEc2IIw1isvdOSs5Zwr6gxQHhH8BrWrWRGc-6kN1wr7YU0TKzZabMcedvotnafwuDS0UYX7Fsjpo11qd7Wg-0UFl4z74TnvHPGSMypY8IrBZpLXbl-jlz7FP8fIBe7jYdUP5YtVZJpohRVdYuNWz7FnBN0H6oE21e77GiXfbXLvttVUT9GVACATwiMla6kL2kJj68</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2763817727</pqid></control><display><type>article</type><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models &amp; Deployments from a Pragmatic Perspective</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Ashok, Kanneboina ; Gopikrishnan, S.</creator><creatorcontrib>Ashok, Kanneboina ; Gopikrishnan, S.</creatorcontrib><description>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative &amp; qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers &amp; network designers are required to test &amp; validate multiple security models for their deployments. Due to which, the cost&amp;time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, &amp; route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3234632</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Attacks ; Blockchain ; Blockchains ; Business metrics ; Complexity ; Computational modeling ; Cryptography ; Data ; Data models ; Design ; Empirical analysis ; Energy ; Energy consumption ; Internet of Things ; IoT ; Machine learning ; Medical services ; medical signal detection ; Monitoring ; Network latency ; Network security ; Optimization ; Performance measurement ; Physical ; Privacy ; QoS ; Quality of service ; Remote monitoring ; Route ; Security ; Signal detection ; Statistical analysis</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</citedby><cites>FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</cites><orcidid>0000-0001-9082-9012 ; 0000-0002-6162-7486</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10007827$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2101,27632,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Ashok, Kanneboina</creatorcontrib><creatorcontrib>Gopikrishnan, S.</creatorcontrib><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models &amp; Deployments from a Pragmatic Perspective</title><title>IEEE access</title><addtitle>Access</addtitle><description>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative &amp; qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers &amp; network designers are required to test &amp; validate multiple security models for their deployments. Due to which, the cost&amp;time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, &amp; route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</description><subject>Attacks</subject><subject>Blockchain</subject><subject>Blockchains</subject><subject>Business metrics</subject><subject>Complexity</subject><subject>Computational modeling</subject><subject>Cryptography</subject><subject>Data</subject><subject>Data models</subject><subject>Design</subject><subject>Empirical analysis</subject><subject>Energy</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Machine learning</subject><subject>Medical services</subject><subject>medical signal detection</subject><subject>Monitoring</subject><subject>Network latency</subject><subject>Network security</subject><subject>Optimization</subject><subject>Performance measurement</subject><subject>Physical</subject><subject>Privacy</subject><subject>QoS</subject><subject>Quality of service</subject><subject>Remote monitoring</subject><subject>Route</subject><subject>Security</subject><subject>Signal detection</subject><subject>Statistical analysis</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1PGzEQXVWtVAT8AnqwVKm3BH9_HNM0QCQQqIGz5XhnU0e7cWo7SPn3GBYh5jKjmXnvjeY1zQXBU0KwuZzN54vVakoxZVNGGZeMfmlOKJFmwgSTXz_V35vznLe4hq4toU6aw6q4EnIJ3vVotnP9MYeMYof-whALoBtwffmH7uIulJjCboN-uwwtWsZHtAJ_SKEc67SFPqNf6A_s-3gcYFcy6lIckEMPyW2GKuHRA6S8B1_CM5w13zrXZzh_z6fN09XicX4zub2_Xs5ntxPPsSkTIbzBVHSEc2IIw1isvdOSs5Zwr6gxQHhH8BrWrWRGc-6kN1wr7YU0TKzZabMcedvotnafwuDS0UYX7Fsjpo11qd7Wg-0UFl4z74TnvHPGSMypY8IrBZpLXbl-jlz7FP8fIBe7jYdUP5YtVZJpohRVdYuNWz7FnBN0H6oE21e77GiXfbXLvttVUT9GVACATwiMla6kL2kJj68</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Ashok, Kanneboina</creator><creator>Gopikrishnan, S.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9082-9012</orcidid><orcidid>https://orcid.org/0000-0002-6162-7486</orcidid></search><sort><creationdate>20230101</creationdate><title>Statistical Analysis of Remote Health Monitoring Based IoT Security Models &amp; Deployments from a Pragmatic Perspective</title><author>Ashok, Kanneboina ; Gopikrishnan, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-55c9025f1441913005bca8643d14c7299e14f10bebd639844a6c94878c56935b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Attacks</topic><topic>Blockchain</topic><topic>Blockchains</topic><topic>Business metrics</topic><topic>Complexity</topic><topic>Computational modeling</topic><topic>Cryptography</topic><topic>Data</topic><topic>Data models</topic><topic>Design</topic><topic>Empirical analysis</topic><topic>Energy</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Machine learning</topic><topic>Medical services</topic><topic>medical signal detection</topic><topic>Monitoring</topic><topic>Network latency</topic><topic>Network security</topic><topic>Optimization</topic><topic>Performance measurement</topic><topic>Physical</topic><topic>Privacy</topic><topic>QoS</topic><topic>Quality of service</topic><topic>Remote monitoring</topic><topic>Route</topic><topic>Security</topic><topic>Signal detection</topic><topic>Statistical analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ashok, Kanneboina</creatorcontrib><creatorcontrib>Gopikrishnan, S.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ashok, Kanneboina</au><au>Gopikrishnan, S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Statistical Analysis of Remote Health Monitoring Based IoT Security Models &amp; Deployments from a Pragmatic Perspective</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Remote health monitoring-based Internet of Things (IoT) network security is a multidomain task, that involves identification of network attack, evaluation of mitigation strategies, design of performance aware data security models, integration of privacy models, and modelling of device-level security methods. Internal designs for each of these models is highly complex, and varies in terms of quantitative &amp; qualitative performance measures. This is due to their variation in terms of design nuances, functional advantages, context-based limitations, and possible deployment-specific future scopes. Due to this variation, it is highly ambiguous to select these models for performance-specific IoT deployments. Moreover, these models also vary in terms of security level, Quality of Service (QoS) parameters, scalability performance, computational complexity, deployment costs, and other performance metrics. Thus, to identify optimum models, researchers &amp; network designers are required to test &amp; validate multiple security models for their deployments. Due to which, the cost&amp;time to market for IoT devices is increased, thereby affecting viability of IoT products. To overcome these selection issues, an empirical survey of different IoT security models including blockchains, encryption techniques, hashing models, privacy preservation techniques, machine learning based security methods, etc. are discussed in this text. This text also discusses various attack mitigation models that provide node-level security, network-level security, physical security, &amp; route-level security. This discussion will assist in initially evaluating different operating characteristics of these models, which will allow readers to identify most suited models for their application-specific use cases. This article also assesses the models' performance in terms of computational latency, energy consumption, security levels, deployment complexity, and scalability measures. These metrics are compared between different security models, which will further assist readers to identify optimum models for their performance-specific use cases. To further assist in model selection, this text proposes evaluation of a novel IoT Security Performance Rank (ISRP), that combines various performance metrics to form a singular rank which can be used to describe overall performance of these models. Readers will be able to consider optimal security approaches for new and current IoT installations based on this ranking.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3234632</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-9082-9012</orcidid><orcidid>https://orcid.org/0000-0002-6162-7486</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023-01, Vol.11, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2023_3234632
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Attacks
Blockchain
Blockchains
Business metrics
Complexity
Computational modeling
Cryptography
Data
Data models
Design
Empirical analysis
Energy
Energy consumption
Internet of Things
IoT
Machine learning
Medical services
medical signal detection
Monitoring
Network latency
Network security
Optimization
Performance measurement
Physical
Privacy
QoS
Quality of service
Remote monitoring
Route
Security
Signal detection
Statistical analysis
title Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments from a Pragmatic Perspective
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T06%3A41%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Statistical%20Analysis%20of%20Remote%20Health%20Monitoring%20Based%20IoT%20Security%20Models%20&%20Deployments%20from%20a%20Pragmatic%20Perspective&rft.jtitle=IEEE%20access&rft.au=Ashok,%20Kanneboina&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3234632&rft_dat=%3Cproquest_cross%3E2763817727%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2763817727&rft_id=info:pmid/&rft_ieee_id=10007827&rft_doaj_id=oai_doaj_org_article_f705c83ca5c44fa996042a35c77e8468&rfr_iscdi=true