Devi et al., 2024 - Google Patents
Establishment of secure and authentic data security framework in wireless sensor network using key reconciliationDevi et al., 2024
- Document ID
- 17955943306450195975
- Author
- Devi S
- Kumar A
- Publication year
- Publication venue
- International Journal of Information Technology
External Links
Snippet
A massive amount of data is generated in today's modern era. The world's open and interconnected nature puts this data and its privacy at constant risk. As a result, establishing a secure data exchange mechanism for large datasets in cyberspace is an extremely difficult …
- 238000004422 calculation algorithm 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
Pavithran et al. | Towards building a blockchain framework for IoT | |
Nguyen et al. | Integration of blockchain and cloud of things: Architecture, applications and challenges | |
Ferrag et al. | Blockchain technologies for the internet of things: Research issues and challenges | |
Mubarakali | An efficient authentication scheme using blockchain technology for wireless sensor networks | |
Shrestha et al. | Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities | |
Prabadevi et al. | Toward blockchain for edge-of-things: a new paradigm, opportunities, and future directions | |
Li et al. | Preserving edge knowledge sharing among IoT services: A blockchain-based approach | |
Luo et al. | Edge computing integrated with blockchain technologies | |
Shi et al. | BacS: a blockchain-based access control scheme in distributed internet of things | |
Li et al. | Blockchain-empowered data-driven networks: A survey and outlook | |
Shen et al. | Blockchains for artificial intelligence of things: a comprehensive survey | |
Singh et al. | Access management of IoT devices using access control mechanism and decentralized authentication: A review | |
Alshehri et al. | Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment | |
Kiwelekar et al. | Blockchain-based security services for fog computing | |
Feng et al. | Blockchain enabled zero trust based authentication scheme for railway communication networks | |
Khan et al. | Enhanced decentralized management of patient-driven interoperability based on blockchain | |
Paulraj et al. | Admission control policy and key agreement based on anonymous identity in cloud computing | |
Devi et al. | Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation | |
Chen et al. | An attribute-encryption-based cross-chain model in urban internet of vehicles | |
Liu et al. | Blockchain based trust management in vehicular networks | |
Mukherjee et al. | A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem | |
Alphonse et al. | Blockchain and internet of things: An overview | |
Laroiya et al. | IoT and blockchain-based method for device identity verification | |
Sreelakshmi et al. | Securing IoT applications using blockchain: a survey |