Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Security and Privacyarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Security and Privacy
Article . 2024 . Peer-reviewed
License: CC BY NC ND
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
RiuNet
Article . 2024
License: CC BY NC ND
Data sources: RiuNet
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks

Authors: S. Rajasoundaran; S. A. Sivakumar; S. Devaraju; M. Jahir Pasha; Jaime Lloret;

A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks

Abstract

AbstractThe role of firewalls and security principles in resource‐limited wireless networks and Wireless Sensor Networks (WSN) is more expected than in any dedicated network environment. The advanced wireless technologies and emerging fashion of autonomous wireless network nodes are mostly expecting resilient firewall services with multi‐level security policies. Wireless networks are classified under sensor networks, Internet of Things (IoT) mobile networks, and so forth. According to the expectations, security frameworks are gradually invented around the communication platform using various ideologies. The novel ideology and respective implementation effort open better solutions against wireless network attacks. Anyhow, the minimal production of time complexity, energy complexity, and computation overhead from any novel security approach is always considered under the best practices. The complexity levels directly affect the wireless node's energy consumption ability and operational spans severely. The energy optimization techniques and load‐balancing techniques integrated into multi‐class firewall rules are extremely useful solutions for resource‐limited wireless networks. This article has been motivated to analyze the recent firewall techniques and secure data communication mechanisms used for securing wireless networks. Consequently, the practice of comparative literature analysis helps to improve the current limitations identified under the classified categories of security mechanisms such as energy‐optimized security principles and load‐balanced security principles. The establishment of secure and energy‐optimized multi‐class firewall rules in each wireless node assures a healthy focus on next‐generation networks. The experiment section shows the benefits of energy‐optimized secure network communication in terms of better accuracy and the benefits of load‐balanced secure network communication through minimal overhead in computing platforms.

Country
Spain
Keywords

Artificial intelligence, Internet of things, INGENIERÍA TELEMÁTICA, Firewall, Attacks, Wireless sensor networks, Energy efficiency, Security, Wireless networks

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 31
    download downloads 42
  • 31
    views
    42
    downloads
    Data sourceViewsDownloads
    RiuNet3142
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
1
Average
Average
Average
31
42
Green
hybrid