[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Devi et al., 2024 - Google Patents

Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation

Devi et al., 2024

Document ID
17955943306450195975
Author
Devi S
Kumar A
Publication year
Publication venue
International Journal of Information Technology

External Links

Snippet

A massive amount of data is generated in today's modern era. The world's open and interconnected nature puts this data and its privacy at constant risk. As a result, establishing a secure data exchange mechanism for large datasets in cyberspace is an extremely difficult …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Alfandi et al. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues
Pavithran et al. Towards building a blockchain framework for IoT
Nguyen et al. Integration of blockchain and cloud of things: Architecture, applications and challenges
Ferrag et al. Blockchain technologies for the internet of things: Research issues and challenges
Mubarakali An efficient authentication scheme using blockchain technology for wireless sensor networks
Shrestha et al. Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities
Prabadevi et al. Toward blockchain for edge-of-things: a new paradigm, opportunities, and future directions
Li et al. Preserving edge knowledge sharing among IoT services: A blockchain-based approach
Luo et al. Edge computing integrated with blockchain technologies
Shi et al. BacS: a blockchain-based access control scheme in distributed internet of things
Li et al. Blockchain-empowered data-driven networks: A survey and outlook
Shen et al. Blockchains for artificial intelligence of things: a comprehensive survey
Singh et al. Access management of IoT devices using access control mechanism and decentralized authentication: A review
Alshehri et al. Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment
Kiwelekar et al. Blockchain-based security services for fog computing
Feng et al. Blockchain enabled zero trust based authentication scheme for railway communication networks
Khan et al. Enhanced decentralized management of patient-driven interoperability based on blockchain
Paulraj et al. Admission control policy and key agreement based on anonymous identity in cloud computing
Devi et al. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation
Chen et al. An attribute-encryption-based cross-chain model in urban internet of vehicles
Liu et al. Blockchain based trust management in vehicular networks
Mukherjee et al. A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem
Alphonse et al. Blockchain and internet of things: An overview
Laroiya et al. IoT and blockchain-based method for device identity verification
Sreelakshmi et al. Securing IoT applications using blockchain: a survey