2021
DOI: 10.31185/wjcm.vol1.iss1.7
|View full text |Cite
|
Sign up to set email alerts
|

Escalation of Security and Privacy in Internet of Things using Advanced IPv6 Based Security Mechanism

Abstract: Kevin Ashton coined the phrase Internet of Things in 1999 with high performance implementation for corporate and social world. Thanks to the success of high-performing Internet of Things (IoT) whereby the tags and sensors are the foundation for IoT implementation of radio frequency identification with enormous implementation patterns. Real world objects and systems that are remotely managed using program- based tools may be outfitted with RFID tags. Radio frequency recognition devices may identify objects and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The algorithm relates to different situations, independent of UT deployment, in which UAVs are placed independently or in conjunction with the predetermined BSs. Major security flaws in Smart Medical Devices in Heterogeneous WMSNs will be found by [25][26][27]. Through security tests, the researcher will examine and validate the current IoMT security protocols to find any security holes that might be exploited to compromise the devices' integrity.…”
Section: Literature Surveymentioning
confidence: 99%
“…The algorithm relates to different situations, independent of UT deployment, in which UAVs are placed independently or in conjunction with the predetermined BSs. Major security flaws in Smart Medical Devices in Heterogeneous WMSNs will be found by [25][26][27]. Through security tests, the researcher will examine and validate the current IoMT security protocols to find any security holes that might be exploited to compromise the devices' integrity.…”
Section: Literature Surveymentioning
confidence: 99%
“…The social dimension includes the positive and negative effects on individuals and societies that result from technology. Ethical dimension means setting limits for dealing with technology, adhering to those limits, and resolving legitimate and legal issues when these limits are exceeded [26][27][28]. Components of "CL" are Knowledge of computer hardware and software components and its accessories; understand the computer and its uses; connect to the internet or other networks, if any; use application programs with high efficiency; program a computer or deal with one of the programming languages; change the file name; select a non-sequential group of files; open a website on the Internet; browse websites easily; create my own E-mail [29,30].…”
Section: Computerized Literacy (Cl)mentioning
confidence: 99%