Security Metric for Information Network

- Authors: Saurabh Singhal1, Manju2
-
View Affiliations Hide Affiliations1 Department of Computer Science and Engineering, Apex Institute of Technology, Chandigarh University, Chandigarh, India 2 Department of Computer Science and Information Technology, Jaypee Institute of Information Technology, Noida, Uttar Pradesh, India
- Source: IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications , pp 117-124
- Publication Date: March 2024
- Language: English
Given that dislodged working conditions are in play, system administrators are tasked with handling security solutions that, in turn, impact most of the working layers of the OSI model. This comprehensive approach depicts a situation in which the originator perceives that their data is traversing through a specified encryption process at every stage/layer, starting from the top layer (i.e., Application Layer) and gradually proceeding down to the last one (i.e., Physical Layer). Similarly, the decryption process takes place at every stage/layer at the destination end.
Hardbound ISBN:
9789815049497
Ebook ISBN:
9789815049480
-
From This Site
/content/books/9789815049480.chapter-9dcterms_subject,pub_keyword-contentType:Journal -contentType:Figure -contentType:Table -contentType:SupplementaryData105
/content/books/9789815049480.chapter-9
dcterms_subject,pub_keyword
-contentType:Journal -contentType:Figure -contentType:Table -contentType:SupplementaryData
10
5
Chapter
content/books/9789815049480
Book
false
en
