Enabling Zero Trust Security in IoMT Edge Network.
Maha Ali AllouziJaved KhanPublished in: CoRR (2024)
Keyphrases
- trust relationships
- security protection
- enterprise network
- security threats
- network security
- policy enforcement
- network structure
- computer networks
- security measures
- cyber attacks
- network management
- trust model
- internet service providers
- security management
- network monitoring
- computer security
- public key infrastructure
- network layer
- virtual private network
- security issues
- information security
- network traffic
- access control
- neural network
- security policies
- forensic analysis
- edge information
- communication networks
- malicious nodes
- social network analysis
- edge detection
- wireless sensor networks