Enhancing Security Mechanisms for IoT-Fog Networks
Journal of Robotics and Control (JRC),
Journal Year:
2024,
Volume and Issue:
5(1), P. 152 - 159
Published: Jan. 24, 2024
This
study
contributes
to
improving
Morocco's
fish
canning
industry
by
integrating
artificial
intelligence
(AI).
The
primary
objective
involves
developing
an
AI
and
image
processing-based
system
monitor
guarantee
process
quality
in
the
facility.
It
commenced
with
IoT-enabled
device
capable
of
capturing
processing
images,
leading
creation
AI-driven
adept
at
accurately
categorizing
improperly
crimped
cans.
Further
advancements
focused
on
reinforcing
communication
between
IoT
devices
servers
housing
individual
client's
neural
network
weights.
These
weights
are
vital,
ensuring
functionality
our
device.
efficiency
cans
relies
updated
from
Fog
server,
crucial
for
continual
refinement
adaptation
diverse
can
shapes.
Securing
integrity
server
is
imperative
avoid
disruptions
classification,
emphasizing
need
secure
channels.
In
this
paper,
key
scientific
contribution
revolves
around
devising
a
security
protocol
founded
HMAC.
guarantees
authentication
preserves
exchanged
computing
nodes
devices.
innovative
addition
comprehensive
dictionary
within
significantly
bolsters
measures,
enhancing
overall
safety
these
interconnected
entities.
Language: Английский
Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions
Winnie Owoko
No information about this author
World Journal of Advanced Engineering Technology and Sciences,
Journal Year:
2024,
Volume and Issue:
11(2), P. 454 - 475
Published: April 18, 2024
The
TCP/IP
protocol
suite,
a
cornerstone
of
modern
networking,
faces
escalating
threats
from
evolving
attack
vectors
targeting
its
headers.
This
survey
explores
emerging
trends
in
header
attacks,
assessing
their
potential
impact
and
outlining
future
directions
for
defense
strategies.
By
scrutinizing
recent
research
real-world
incidents,
the
paper
aims
to
offer
insights
into
threat
landscape
provide
recommendations
enhancing
network
security.
Key
areas
investigation
include
historical
evolution
vulnerabilities,
adaptation
attackers'
techniques
over
time,
development
novel
mechanisms
counteract
these
threats.
underscores
critical
importance
understanding
attacks
contemporary
cybersecurity
highlights
necessity
proactive
measures
safeguard
infrastructures.
addressing
challenges
posed
by
identifying
further
development,
this
contributes
ongoing
efforts
strengthen
defenses
mitigate
risks
associated
with
cyber
protocols.
Language: Английский