Decentralized security framework for future IoT end-to-end connectivity

Qin Xin, Rubén González Crespo, Carlos Enrique Montenegro-Marin, Vicente García Díaz, Mamoun Alazab

Research output: Contribution to journalArticlepeer-review


The emergence of the Internet of Things (IoT) has given digital communications a range of interconnected functionalities. The IoT is an intelligent technology between the real and the digital world. An IoT end-to-end solution comprises components such as Component for User Access: Mobile Application or Web Application. IoT Gateway. Cloud Infrastructure. The upcoming technology of contacts and service delivery in IoT is comprehensive and open. The broad IoT platform is provided by a network of sensors and separate nodes. IoT framework is adopted for implementation and assistance by the intelligent computing, storing information, and characteristics of the devices. Safety is a big concern in such an open atmosphere and needs to be dealt with the decentralization. A security framework for future IoT end-to-end connectivity (SF-FIoTC) is proposed. Decentralized and scalable safety architecture for future IoT is developed. This system uses the benefits of intelligent computation and tree-based hash systems to ensure device-to-device privacy and to need authorization. The tree-based hashing can be used for the authentication of demands. The system's decentralized safety feature offers safety at the machine level and ensures greater confidentiality and communication systems reliability. In terms of classification accuracy, transmission loss, delivery ratio, and latency, the operational study of the suggested security architecture can be analyzed, and the performance is excellent in all cases.

Original languageEnglish
Pages (from-to)1-21
Number of pages21
JournalAnnals of Operations Research
Publication statusE-pub ahead of print - Apr 2022


Dive into the research topics of 'Decentralized security framework for future IoT end-to-end connectivity'. Together they form a unique fingerprint.

Cite this