2020
DOI: 10.1080/19361610.2020.1736458
|View full text |Cite
|
Sign up to set email alerts
|

Modified Hardware Security Algorithms for Process Industries Using Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In particular, vector q plays the role of a key that is shared among the legitimate agents. Notably, such a vector could be provided as a hardware key (e.g., see [41]) before the agents are deployed or selected during a secure initialization phase and securely shared (e.g., see [42], [43]). For instance, in the case of networks of mobile agents, one could have the vector q selected when the agents are in a "safe zone", and then they use it after they are deployed in an "unsafe zone" (e.g., see [44], [45], where robots are initially in close spatial proximity and subsequently start exploring an environment).…”
Section: Proposed Approachmentioning
confidence: 99%
“…In particular, vector q plays the role of a key that is shared among the legitimate agents. Notably, such a vector could be provided as a hardware key (e.g., see [41]) before the agents are deployed or selected during a secure initialization phase and securely shared (e.g., see [42], [43]). For instance, in the case of networks of mobile agents, one could have the vector q selected when the agents are in a "safe zone", and then they use it after they are deployed in an "unsafe zone" (e.g., see [44], [45], where robots are initially in close spatial proximity and subsequently start exploring an environment).…”
Section: Proposed Approachmentioning
confidence: 99%
“…The literature review of the paper that were referenced and those that serves the base paper and supporting paper which provides the clear idea of the traffic monitoring system and machine learning algorithms and proper method of recommendations. [1][2][3] Due to the swift enlargement of automotive transportation and urbanization, traffic jam has been enlarging and becomes a significant problem in most major cities worldwide. Then, an algorithm is presented to spot congested road segments and construct congestion propagation graphs to model congestion propagation in urban road networks [4,5].…”
Section: Literature Surveymentioning
confidence: 99%
“…This project is meant to offer a major parameter to diagnose the disease. The Internet of Things (IoT) is rapidly growing attention not only in certain fields but much more, especially in personalized healthcare [1][2][3][4][5]. Medical scientists and researchers, work hard within the field of innovation and research for many decades to urge better health services and happiness in human lives [6,7].…”
Section: Introductionmentioning
confidence: 99%