Security issues and challenges in internet of things (iot) system
JA Beltran, P Mudholkar, M Mudholkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Significant privacy and security concerns apply to the Internet of Things. IoT issues might
include driver ignorance, inadequate device updates, a lack of robust and effective …
include driver ignorance, inadequate device updates, a lack of robust and effective …
A novel approach to iot based plant health monitoring system in smart agriculture
M Mudholkar, P Mudholkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The study and practice of recognizing and resolving physiological and biologic processes
that prevent plants from reaching their full hereditary potential for applications such as food …
that prevent plants from reaching their full hereditary potential for applications such as food …
The block chain technology to protect data access using intelligent contracts mechanism security framework for 5G networks
R Yadav, KK Vaigandla… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The introduction of the study primarily emphasises the significance of utilising block chain
technologies with the possibility of privacy and security benefits from the 5G Network. One …
technologies with the possibility of privacy and security benefits from the 5G Network. One …
Analysis of Potential Health and Environmental Risks Associated with 6G Wireless Communication Networks
Over the last several decades, there has been a meteoric rise in the number of people
wanting to connect wirelessly. Due to rapid growth of new applications (such as real-time …
wanting to connect wirelessly. Due to rapid growth of new applications (such as real-time …
Blockchain approach for implementing access control in IOT
J Panduro-Ramirez, M Lourens… - 2023 International …, 2023 - ieeexplore.ieee.org
Block chain is now attracting a lot of interest from scientists and experts for a variety of
reasons, including wireless communication decentralization, remote access, digital security …
reasons, including wireless communication decentralization, remote access, digital security …
IoT Wireless Technology using lattice-based open source public-key NTRU cryptosystem
This article covers a grid-centred, open accessible, public-key NTRU crypto device that can
be utilised with in Internet of Things (IoT). Because the IoT includes consumers' consumer …
be utilised with in Internet of Things (IoT). Because the IoT includes consumers' consumer …
Integration of DL on Multi-Carrier Non-Orthogonal Multiple Access System with Simultaneous Wireless Information and Power Transfer
A Chaturvedi, A Bhardwaj, D Singh… - … on System Modeling …, 2022 - ieeexplore.ieee.org
Simultaneous Multi-Carrier (MC) NOMA&Wireless Information (SWIPT) are exciting ideas for
coming net within the 5th generation and beyond because of their capability for allowing …
coming net within the 5th generation and beyond because of their capability for allowing …
A design of dynamic rate aware classified key for network security in wireless sensor network through optimized distributed secure routing protocol
Data must be transferred in a secure manner in order to transmit information through an
industrial network, creating a high security root. A lot of study has been done on wireless …
industrial network, creating a high security root. A lot of study has been done on wireless …
A Study of Efficiency Evaluation of Power Economical Protocols of Wireless Sensor Systems
S Kaur, L Goswami - … on System Modeling & Advancement in …, 2022 - ieeexplore.ieee.org
Development use of Wireless Sensor Systems (WSNs) with in military, smart things,
healthcare, the climate, or other fields has increased significantly during the last few …
healthcare, the climate, or other fields has increased significantly during the last few …
A Structured Investigation of Network Security Strategies and its Applications
S Makka, T Misra, R Deorari, D Kumar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Organizations can utilize big data to spread information over a network, analyses vast
amounts of complex data, and find hidden trends and correlations. The deployment of a …
amounts of complex data, and find hidden trends and correlations. The deployment of a …