2022
DOI: 10.1109/jiot.2021.3078810
|View full text |Cite
|
Sign up to set email alerts
|

An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Compared to related works, no direct exchanges between the controllers are required in this solution. In the aspect of routing security scheme, in literature 33 , probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. literature 34 presents a security-aware routing mechanism and discusses with quality of service (QoS) factors such as throughput and accuracy for improving routing mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Compared to related works, no direct exchanges between the controllers are required in this solution. In the aspect of routing security scheme, in literature 33 , probabilistic framework is proposed that facilitates data routing between the nodes and local cloud in an IoT network coupled with a multitier trust and encryption scheme for secure data delivery in the cloud-based IoT network. literature 34 presents a security-aware routing mechanism and discusses with quality of service (QoS) factors such as throughput and accuracy for improving routing mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…So, the summation of all the rows is done separately and depicted by Sum Row, where Node N4 has the highest value of trust. Therefore, node N4 is selected for the task of forwarding the packets [33].…”
Section: Trust Computation Using Cumulated Trust Valuementioning
confidence: 99%
“…Among these, authentication is one of the security services to be deployed in the network. Techniques based on the Blockchain (M. Sharma et al, 2020), machine learning (Punithavathi et al, 2019), cloud services (D. K. Sharma et al, 2021), biometric (Sui et al, 2011), session keys or session time, cryptography can be utilized for ensuring security via authentication, identity and privacy management. Cryptography is broadly categorized into symmetric key and asymmetric key.…”
Section: Background and Literature Reviewmentioning
confidence: 99%