TY - CHAP
T1 - Congestion-Aware and Delay-Aware Application-Specific Security Protocol for WSN/IoT
AU - Suman, Gaurav
AU - Tolani, Manoj
AU - Kumar, Pankaj
AU - Balodi, Arun
AU - Bajpai, Ambar
AU - Albalawi, Nasser S.
N1 - Publisher Copyright:
© 2025 selection and editorial matter, Manoj Tolani, Arun Balodi, Ambar Bajpai, Vishal Jain, Piya Kovintavewat; individual chapters, the contributors.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - The WSN/IoT devices operate with limited processing powers, bandwidth-restrained environments, and a shortage of energy where the strategy of the security protocol is required, which reduces energy consumption without compromising the security of the network. The major concern here is the building of a protocol that not only eliminates these limitations but also is able to respond wisely and dynamically to the ever-changing network conditions. Conventional security solutions proved not to be adaptive solutions, hence yielding to increased overhead, congestion, and delays, delaying the real-time responsiveness that the WSN/IoT needs rapidly. The envisioned protocol seeks to strike an optimal equilibrium, providing robust security measures without compromising the essential efficiency and responsiveness dynamic for the successful operation of WSN/IoT deployments. Compounding the challenge is the inherent dynamism of WSN/IoT networks, where factors such as shifting network topology, intermittent connectivity, and variable traffic loads necessitate adaptive security measures. The proposed protocol aims to alleviate the impact of congestion and delay in timely data transmission, effectively addressing the unique challenges posed by resource limitations in WSN/IoT environments. By implementing this approach, the congestion-aware and delay-aware security protocol aims to strengthen the security framework of WSN/IoT deployments, achieving a balanced trade-off between security and operational efficiency.
AB - The WSN/IoT devices operate with limited processing powers, bandwidth-restrained environments, and a shortage of energy where the strategy of the security protocol is required, which reduces energy consumption without compromising the security of the network. The major concern here is the building of a protocol that not only eliminates these limitations but also is able to respond wisely and dynamically to the ever-changing network conditions. Conventional security solutions proved not to be adaptive solutions, hence yielding to increased overhead, congestion, and delays, delaying the real-time responsiveness that the WSN/IoT needs rapidly. The envisioned protocol seeks to strike an optimal equilibrium, providing robust security measures without compromising the essential efficiency and responsiveness dynamic for the successful operation of WSN/IoT deployments. Compounding the challenge is the inherent dynamism of WSN/IoT networks, where factors such as shifting network topology, intermittent connectivity, and variable traffic loads necessitate adaptive security measures. The proposed protocol aims to alleviate the impact of congestion and delay in timely data transmission, effectively addressing the unique challenges posed by resource limitations in WSN/IoT environments. By implementing this approach, the congestion-aware and delay-aware security protocol aims to strengthen the security framework of WSN/IoT deployments, achieving a balanced trade-off between security and operational efficiency.
UR - https://www.scopus.com/pages/publications/105005677324
UR - https://www.scopus.com/pages/publications/105005677324#tab=citedBy
U2 - 10.1201/9781003491910_6
DO - 10.1201/9781003491910_6
M3 - Chapter
AN - SCOPUS:105005677324
SN - 9781032776682
SP - 94
EP - 107
BT - Security and Privacy Issues for IoT and WSN-based Real-time Applications
PB - CRC Press
ER -