Show simple item record

dc.contributor.authorAlturki, Ryan
dc.contributor.authorAlyamani, Hasan Jumaili
dc.contributor.authorIkram, Mohammed Abdulaziz
dc.contributor.authorRahman, Md Arafatur
dc.contributor.authorAlshehri, Mohammad Dahman
dc.contributor.authorKhan, Fazlullah
dc.contributor.authorHaleem, Muhammad
dc.date.accessioned2021-06-30T14:21:26Z
dc.date.available2021-06-30T14:21:26Z
dc.date.issued2021-06-10
dc.identifier.citationAlturki, R., Alyamani, H.J., Ikram, M.A., Rahman, M.A., Alshehri, M.D., Khan, F. and haleem, M. (2021) Sensor-cloud architecture: a taxonomy of security issues in cloud-assisted sensor networks. IEEE Access, 9, pp. 89344-89359.en
dc.identifier.issn2169-3536en
dc.identifier.doi10.1109/access.2021.3088225en
dc.identifier.urihttp://hdl.handle.net/2436/624162
dc.description© 2021 The Authors. Published by IEEE. This is an open access article available under a Creative Commons licence. The published version can be accessed at the following link on the publisher’s website: https://ieeexplore.ieee.org/document/9451213en
dc.description.abstractThe orchestration of cloud computing with wireless sensor network (WSN), termed as sensor-cloud, has recently gained remarkable attention from both academia and industry. It enhances the processing and storage capabilities of the resources-constrained sensor networks in various applications such as healthcare, habitat monitoring, battlefield surveillance, disaster management, etc. The diverse nature of sensor network applications processing and storage limitations on the sensor networks, which can be overcome through integrating them with the cloud paradigm. Sensor-cloud offers numerous benefits such as flexibility, scalability, collaboration, automation, virtualization with enhanced processing and storage capabilities. However, these networks suffer from limited bandwidth, resource optimization, reliability, load balancing, latency, and security threats. Therefore, it is essential to secure the sensor-cloud architecture from various security attacks to preserve its integrity. The main components of the sensor-cloud architecture which can be attacked are: (i) the sensor nodes; (ii) the communication medium; and (iii) the remote cloud architecture. Although security issues of these components are extensively studied in the existing literature; however, a detailed analysis of various security attacks on the sensor-cloud architecture is still required. The main objective of this research is to present state-of-the-art literature in the context of security issues of the sensor-cloud architecture along with their preventive measures. Moreover, several taxonomies of the security attacks from the sensor-cloud’s architectural perspective and their innovative solutions are also provided.en
dc.description.sponsorshipThis work was supported by the Taif University, Taif, Saudi Arabia, through the Taif University Researchers Supporting Project under Grant TURSP-2020/126.en
dc.formatapplication/pdfen
dc.language.isoenen
dc.publisherIEEEen
dc.relation.urlhttps://ieeexplore.ieee.org/document/9451213en
dc.subjectsecurityen
dc.subjectInternet of thingsen
dc.subjectsensor-cloud architectureen
dc.subjectwireless sensor networksen
dc.titleSensor-cloud architecture: a taxonomy of security issues in cloud-assisted sensor networksen
dc.typeJournal articleen
dc.identifier.eissn2169-3536
dc.identifier.journalIEEE Accessen
dc.date.updated2021-06-30T11:30:05Z
dc.date.accepted2021-06-04
rioxxterms.funderTaif Universityen
rioxxterms.identifier.projectTURSP-2020/126en
rioxxterms.versionVoRen
rioxxterms.licenseref.urihttps://creativecommons.org/licenses/by/4.0/en
rioxxterms.licenseref.startdate2021-06-30en
dc.source.volume9
dc.source.beginpage89344
dc.source.endpage89359
dc.description.versionPublished version
refterms.dateFCD2021-06-30T14:20:57Z
refterms.versionFCDVoR
refterms.dateFOA2021-06-30T14:21:26Z


Files in this item

Thumbnail
Name:
Alturki_et_al_Sensor-cloud_2021.pdf
Size:
2.154Mb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0/