2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068718
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent security framework for iot devices cryptography based end-to-end security architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(22 citation statements)
references
References 3 publications
0
22
0
Order By: Relevance
“…Limitation to integrate smart services by connecting heterogeneous platform devices through the IoT because they are prone to hardware/software and network attacks and, if not properly secured, can lead to privacy issues. To resolve the problem, S. Sridhar and S. Smys et al proposed an Intelligent Security Framework for IoT Devices [30]. Snezana S. et al introduced a novel concept of personal health records based on an e-health strategy where patients own their data using different ways of obtaining data [29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Limitation to integrate smart services by connecting heterogeneous platform devices through the IoT because they are prone to hardware/software and network attacks and, if not properly secured, can lead to privacy issues. To resolve the problem, S. Sridhar and S. Smys et al proposed an Intelligent Security Framework for IoT Devices [30]. Snezana S. et al introduced a novel concept of personal health records based on an e-health strategy where patients own their data using different ways of obtaining data [29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…It can either be considered as grouped, legitimate, secure or as insecure. A mystery channel is impenetrable to catch endeavor; a genuine channel is impenetrable to modifying; an ensured channel is impenetrable to both, and a temperamental channel is none [6]. The approval objective is to express a character, be that as it may, the degree of affirmation methods is amazingly gigantic and it can vary from different perspectives.…”
Section: The Authentication Conceptmentioning
confidence: 99%
“…Once we judge the edge device based on these parameters, we decide on using either a symmetric or an asymmetric encryption algorithm. [4] Symmetric encryption is where only one key is used to encrypt as well as decrypt information and asymmetric encryption is where there are two cryptographic keys, namely, a public key as well as a978 private key where the public key can be used to encrypt information and data but only the private key of the user can be used to decrypt it.…”
Section: Light Weight Encryptionmentioning
confidence: 99%