Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108116 - 108116
Published: June 9, 2022
Language: Английский
Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108116 - 108116
Published: June 9, 2022
Language: Английский
Sensors, Journal Year: 2023, Volume and Issue: 23(8), P. 4117 - 4117
Published: April 19, 2023
The emergence of the Internet Things (IoT) technology has brought about tremendous possibilities, but at same time, it opened up new vulnerabilities and attack vectors that could compromise confidentiality, integrity, availability connected systems. Developing a secure IoT ecosystem is daunting challenge requires systematic holistic approach to identify mitigate potential security threats. Cybersecurity research considerations play critical role in this regard, as they provide foundation for designing implementing measures can address emerging risks. To achieve ecosystem, scientists engineers must first define rigorous specifications serve developing devices, chipsets, networks. such an interdisciplinary involves multiple stakeholders, including cybersecurity experts, network architects, system designers, domain experts. primary ensuring defend against both known unknown attacks. date, community identified several key concerns related architecture These include issues connectivity, communication, management protocols. This paper provides all-inclusive lucid review current state anomalies concepts IoT. We classify analyze prevalent distresses regarding IoT's layered architecture, establish by examining attacks, threats, cutting-edge solutions. Furthermore, we set goals will benchmark assessing whether solution satisfies specific use cases.
Language: Английский
Citations
151Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 103, P. 108316 - 108316
Published: Sept. 1, 2022
Language: Английский
Citations
45Optik, Journal Year: 2022, Volume and Issue: 273, P. 170396 - 170396
Published: Dec. 10, 2022
Language: Английский
Citations
36Wireless Personal Communications, Journal Year: 2023, Volume and Issue: 129(4), P. 2291 - 2318
Published: March 27, 2023
Language: Английский
Citations
21Symmetry, Journal Year: 2024, Volume and Issue: 16(6), P. 726 - 726
Published: June 11, 2024
Currently, Internet of Things (IoT)-based cloud systems face several problems such as privacy leakage, failure in centralized operation, managing IoT devices, and malicious attacks. The data transmission between the healthcare needs trust secure Electronic Health Records (EHRs). IoT-enabled equipment is seen hospitals that have been implementing technology for many years. Nonetheless, medical agencies fail to consider security risk associated with which are readily compromised cause potential threats authentication encryption procedures. Existing computing methods like homomorphic elliptic curve cryptography unable meet security, identity, authentication, devices. majority conventional algorithms lack transmission. Therefore, fog introduced overcome device verification, identification scalable data. In this research manuscript, includes a hybrid mathematical model: Elliptic Curve Cryptography (ECC) Proxy Re-encryption (PR) Enhanced Salp Swarm Algorithm (ESSA) identification, EHRs. ESSA incorporated into PR algorithm determine optimal key size parameters algorithm. Specifically, ESSA, Whale Optimization (WOA) integrated (SSA) enhance its global local search processes. primary objective proposed model further sharing real time services. extensive experimental analysis shows approximately reduced 60 Milliseconds (ms) 18 milliseconds processing improved 25% 3% reliability, compared traditional cryptographic algorithms. Additionally, obtains communication cost 4260 bits memory usage 680 bytes context analysis.
Language: Английский
Citations
7Optik, Journal Year: 2022, Volume and Issue: 273, P. 170421 - 170421
Published: Dec. 13, 2022
Language: Английский
Citations
24Optik, Journal Year: 2022, Volume and Issue: 273, P. 170411 - 170411
Published: Dec. 14, 2022
Language: Английский
Citations
21Eduvest - Journal Of Universal Studies, Journal Year: 2023, Volume and Issue: 3(2), P. 327 - 334
Published: Jan. 17, 2023
We see the critical role technology plays in healthcare midst of a continuous worldwide health crisis. To combat epidemic, South Korea, for example, used smart city' and government-developed applications that follow individuals quarantine. A biosensor can identify virus saliva samples has just been created by India's National Institute Animal Biotechnology, Hyderabad. These developments are made feasible usage certain biosensors have printed circuit boards with metal core components capable withstanding large variations moisture temperature. very sophisticated breakthrough, artificial intelligence IT operations, is altering sector addition to aid nations combating epidemic. This general phrase, also known as AIOps, describes automated detection repair typical problems using big data, machine learning, other AI technologies. AIOps may be industry teach computers analyse CT scan pictures, progression various illnesses, assess effectiveness patient therapy, much moren.
Language: Английский
Citations
12International Journal of Information Technology, Journal Year: 2023, Volume and Issue: 15(8), P. 4403 - 4414
Published: Sept. 26, 2023
Language: Английский
Citations
12Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown
Published: June 28, 2023
Language: Английский
Citations
11