2021 19th OITS International Conference on Information Technology (OCIT) 2021
DOI: 10.1109/ocit53463.2021.00081
|View full text |Cite
|
Sign up to set email alerts
|

Data Security Model Using Deep Learning and Edge Computing for Internet of Things (IoT) in Smart City

Abstract: In the current ongoing world of the IoT (Internet of Things) devices, it is absolutely vital to have a safe, secure and reliable cyberspace. A cyberspace or network where it is free from all sorts of unethical activities like hacked systems, data breaches and stolen data. For that, goal to be accomplished we need to have a modern, strong and rigid cybersecurity system so that the information and data stays safe from threats and attacks. Our conducted research includes recent IoT data security issues and a robu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…In the current ongoing world of IoT devices, it is absolutely vital to have a safe, secure, and reliable cyberspace, free from all sorts of unethical activities like hacked systems, data breaches, and stolen data. For that goal to be accomplished, we need to have a modern, strong, and rigid cybersecurity system so that the information and data stay safe from threats and attacks (Tahsin et al, 2021). The security of the protocol lies in the strength of the cryptographic algorithms chosen by the peers (Bonetto et al, 2012).…”
Section: Parameters Of Speed and Securitymentioning
confidence: 99%
“…In the current ongoing world of IoT devices, it is absolutely vital to have a safe, secure, and reliable cyberspace, free from all sorts of unethical activities like hacked systems, data breaches, and stolen data. For that goal to be accomplished, we need to have a modern, strong, and rigid cybersecurity system so that the information and data stay safe from threats and attacks (Tahsin et al, 2021). The security of the protocol lies in the strength of the cryptographic algorithms chosen by the peers (Bonetto et al, 2012).…”
Section: Parameters Of Speed and Securitymentioning
confidence: 99%