Abstract

The increasing security concerns in Internet-of-Things (IoT) have led the researchers to evolve up with multiple levels of the research-based solution towards identifying and protecting the lethal threats. After reviewing the existing literature, it is found that existing approaches are highly specific toward stopping threats via predefined threat information. Hence, the proposed system introduces a new computational model capable of building up a flexible validation model for evaluating the legitimacy of the IoT nodes. The proposed system develops an algorithm that uses a simplified generation of secret keys, performs encryption, and generates validation tokens to ensure a higher degree of privacy and data integrity. The proposed model also contributes towards a unique energy allocation approach to ensure better energy conservation while performing security operations. The simulated study outcome shows better security and data transmission performance compared to the existing scheme.

Highlights

  • Internet of Things (IoT) offers more extensive coverage of different connected physical objects or machines, which are known as things linked to a broader version of the network, i.e.,the internet [1]

  • The second practical problem is associated with insufficient compliance of IoT devices manufacturers, which leads to insecure transfer and storage of data, usage of older operating environment and software, absence of robust updating mechanism, issues related to hardware, and hard-coded password

  • There are scattered and multi-variants forms of security approaches to ensure that accessibility towards the IoT device is always carried out in secured manner

Read more

Summary

Introduction

Internet of Things (IoT) offers more extensive coverage of different connected physical objects or machines, which are known as things linked to a broader version of the network, i.e.,the internet [1] Such physical objects are contributed by various technologies, software, hardware, actuators, and sensors, mainly with the objective of data transmission over the internet [2]. Data plays a significant role in IoT as this concept has evolved by integrating multiple technologies, e.g., automation, control system, wireless sensor network, ubiquitous computing, analytics, artificial intelligence [3]. This concept mainly targetsdeveloping a smart city by enabling more extensive connections of multiple and different types of machines. The problem is related to a significantly lesser extent of awareness within the users, making the user morevulnerable in threat detection

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.