Trust-Based Communication Systems for Internet of Things Applications. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов страница 16

Trust-Based Communication Systems for Internet of Things Applications - Группа авторов

Скачать книгу

Neelakandan, S “Large scale optimization to minimize network traffic using MapReduce in big data applications”. International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), pp. 193-199, April 2016. DOI : 10.1109/ICCPEIC.2016.7557196.

      30. Neelakandan, S & Paulraj, D 2020, ‘An Automated learning model of Conventional Neural Network based Sentiment Analysis on Twitter Data’, Journal of Computational and Theoretical Nano science. vol. 17, no. 5, pp. 2230-2236, May 2020. DOI : https://doi.org/10.1166/jctn.2020.8876.

      31. Madhan E.S ,Neelakandan, S, R.Annamalai 2020, ‘A Novel Approach for Vehicle Type Classification and Speed Prediction Using Deep Learning’, Journal of Computational and Theoretical Nano science. vol. 17, no. 5, pp. 2237-2242, May 2020.DOI:10.1166/jctn.2020.8877.

      32. Akshat Agrawal, Rajesh Arora, Ranjana Arora, Prateek Agrawal, “Applications of Artificial Intelligence and Internet of Things for Detection and Future to Fight against COVID-19”, A book on Emerging Technologies for battling COVID-19- Applications and Innovations, Feb 2021, Springer.

      33. Vishu Madaan, Aditya Roy, Charu Gupta, Prateek Agrawal, Anand Sharma, Christian Bologa, Radu Prodan, “XCOVNet: Chest X-ray Image Classification for COVID-19 Early Diagnosis using Convolution Neural Networks”, New Generation Computing, Springer, 2021.

      34. Prateek Agrawal, Deepak Chaudhary, Vishu Madaan, Anatoliy Zabrovskiy, Radu Prodan, Dragi Kimovski, Christian Timmerer, “Automated Bank Cheque Verification Using Image Processing and Deep Learning Methods”, Multimedia tools and applications (MTAP), 80(1), pp. 1-32.

      1 *Corresponding author: [email protected]

      3

      IoT Protocol Security Mechanisms

       D. Karthika* and Dr. K. Kalaiselvi†

       Department of Computer Applications, School of Computing Science, Vels Institute of Science, Technology & Advanced Studies (Formerly Vels University), Chennai, Tamil Nadu, India

       Abstract

      The Internet of Things (IoT) is the development production of computer science and communication technology. In recent years, with the development of computer science, communication technology, and perception recognition technology, the network of things has made a great breakthrough. As IoT is broadly used in many fields, the security of IoT is becoming especially important and will have great effects on the industry of IoT. Current Internet security protocols rely on a well-known and widely trusted suite of cryptographic algorithms: the Rivest-Shamir-Adelman (RSA) asymmetric algorithm for digital signatures, the Diffie-Hellman (DH) asymmetric key agreement algorithm, the Advanced Encryption Standard (AES) block cipher for confidentiality, and the SHA1 and SHA-256 secure hash algorithms. This chapter will focus on security concerns, amongst other subjects, and IoT based on the Internet and web security problems are also mentioned. This description is articulated explicitly in different spaces by the protection of the Item Network. The security concerns of the IoT network are strongly connected to its overall application. The IoT can find applications in many fields from the earliest wireless sensor networks such as the smart grid, smart healthcare, smart agriculture, smart logistics, and so on with the suitable security mechanism.

      Keywords: IoT, WSN, security mechanism, encryption, decryption

      The Internet of Things has a big effect. Unfortunately, numerous companies, customer and sector inventive gadget operators, and grassroots bosses would soon find themselves on the verge of a bad safety dream. For digital hoodlums, national-state on-screen actors, and protection professionals, the drive to ‘genius’ is the same for all gadgets [1]. These challenges rely on climate, partnerships, market exchanges, special peace, and well-being in their latent potential. The cyber protection record has been seen to be unwise. Products such as Linux-inserted genius refrigerators, wired laundry washers, cars, wearables, implantable clinical equipment, and manufacturing plants incorporate automation mechanisms and practically all programs that are newly linked to the Internet of Things or IoT. None of these undertakings must be disturbed by security. Since the hot race is serious about sexy new products and highlights, they end up in a dangerous position, not knowing how to produce, send, and function safely [2].

      While mechanically advanced, certain people have ever-present human inspirations and inclinations to attempt, purposely or unknowingly, to exploit these developments. He reiterated that they have a horrible dream of peace. What does it mean? IoT imagination, for one thing, is rapidly surpassing the awareness and awareness of the security of IoT. As fast as possible, modern physical and data systems, gadgets, and alliances, which just lasted 10 years ago, are expanding human morality. DNA will now be organically combined from carefully sequential nucleotide bases to establish novel properties for both animals and humans. That they can do anything does not mean that they can do it every day. The fact that a particular system may be linked does not mean that it can be connected effectively. However, that is just what IoT is doing. It is necessary to reconcile the whole of the glorious, confident considerations of human potential with how human thinking and action often neglect the idealistic objectives. In every case, there will always be conventional inhabitants who will end up snarled in schemes, economic wrecks, and extortion, mishaps will continue to happen, and there will always be hunters of fortune and artists ready to destroy and harvest the hopelessness of others. There are always going to be unmistakable and mysterious offenses [3].

      IoT defense is typically an assembly of computer security and architectural regulation rather than traditional cyber security. It seems to be something more than minor documents, servers, base building, and security of documents. Immediate or proper surveillance of the country’s critical networks may be needed or likely controlled over the Internet. In other words: the statement, which today is seen as a digital substantive framework by many industry experts, is an integral aspect of what IoT knows from computer protection [4]. Cyber defense does not contend periodically with physical and security factors or the vital global communications that the gadget provide in the unlikely case that you need a timeline in some way. Advanced computer control makes for IoT only when the protection criterion is not confined to essential data proof, honesty, rejection, etc. values in terms of physical and system startup and reception of the knowledge in the actual world. The IoT has essential and physical characteristics at the end of the day. IoT contraptions are real objects that can contribute to protection in many ways. This may contribute to physical injury, including death of persons and property, through the trade-off of certain contractions.

Скачать книгу