Presently, a green Internet of Things (IoT) based energy aware network plays a significant part in the sensing technology. The development of IoT has a major impact on several application areas such as healthcare, smart city, transportation, etc. The exponential rise in the sensor nodes might result in enhanced energy dissipation. So, the minimization of environmental impact in green media networks is a challenging issue for both researchers and business people. Energy efficiency and security remain crucial in the design of IoT applications. This paper presents a new green energy-efficient routing with DL based anomaly detection (GEER-DLAD) technique for IoT applications. The presented model enables IoT devices to utilize energy effectively in such a way as to increase the network span. The GEER-DLAD technique performs error lossy compression (ELC) technique to lessen the quantity of data communication over the network. In addition, the moth flame swarm optimization (MSO) algorithm is applied for the optimal selection of routes in the network. Besides, DLAD process takes place via the recurrent neural network-long short term memory (RNN-LSTM) model to detect anomalies in the IoT communication networks. A detailed experimental validation process is carried out and the results ensured the betterment of the GEER-DLAD model in terms of energy efficiency and detection performance.
No abstract
Phishing is deceptive attempt that targets an individual or an organization, seeking unauthorized access to confidential data or personal credentials such as credit card information, passwords etc. by an individual that poses as a reputable entity or person. It has become a stern threat to companies that deal with E-transactions. If these threats cannot be ceased, people cannot trust online transactions that include authentication over credentials. In the project, we have used an image-based authentication using Visual Cryptography (VC).The integrity of the secret image is maintained by dividing the secret image into two splits using VC, one is stored in server side database and other is given to the user such that the Secret Image can be recognized only when both the splits are concurrently available. The technique of both image processing and a cryptography is used in my project. Image processing is a technique to transform the secret image into digital form and carry out some operation on it, in a visual cryptography the Secret Image is splitting into splits and is kept in the server database, after login by the user, the Secret Image should get a match with its content behind the image. After both user and server side shares get matched, the user can login into the website very securely.
In recent times, Internet of Things (IoT) has become a hot research topic and it aims at interlinking several sensor-enabled devices mainly for data gathering and tracking applications. Wireless Sensor Network (WSN) is an important component in IoT paradigm since its inception and has become the most preferred platform to deploy several smart city application areas like home automation, smart buildings, intelligent transportation, disaster management, and other such IoT-based applications. Clustering methods are widely-employed energy efficient techniques with a primary purpose i.e., to balance the energy among sensor nodes. Clustering and routing processes are considered as Non-Polynomial (NP) hard problems whereas bio-inspired techniques have been employed for a known time to resolve such problems. The current research paper designs an Energy Efficient Two-Tier Clustering with Multi-hop Routing Protocol (EETTC-MRP) for IoT networks. The presented EETTC-MRP technique operates on different stages namely, tentative Cluster Head (CH) selection, final CH selection, and routing. In first stage of the proposed EETTC-MRP technique, a type II fuzzy logic-based tentative CH (T2FL-TCH) selection is used. Subsequently, Quantum Group Teaching Optimization Algorithm-based Final CH selection (QGTOA-FCH) technique is deployed to derive an optimum group of CHs in the network. Besides, Political Optimizer based Multihop Routing (PO-MHR) technique is also employed to derive an optimal selection of routes between CHs in the network. In order to validate the efficacy of EETTC-MRP method, a series of experiments was conducted and the outcomes were examined under distinct measures. The experimental analysis infers that the proposed EETTC-MRP technique is superior to other methods under different measures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.