Data security mechanism based on hierarchy analysis for internet of things

Author(s):  
Wu Jun ◽  
Mei Lei ◽  
Zhong Luo



Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.



Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 453-465
Author(s):  
Nguyen Dinh Trung ◽  
Dinh Tran Ngoc Huy ◽  
Le Thi Thanh Huong ◽  
Ta Van Thanh ◽  
Nguyen Thi Phuong Thanh ◽  
...  

Once again in this study, we emphasizes strongly on applications of mathematical solutions for industrial uses. By using qualitative analysis, synthesis and inductive methods, together with statistic data, our paper target is to analyze aspects of SWOT analysis on blockchain technology and its opportunities for various industries and sectors in emerging markets such as Vietnam. This is based on the original foundation theory indicating that blockchain tech functioned as a mathematical solutions that can be applied for solving commerce secrets, with high data security and can be used for intellectual property. Among our research results is findings on the connection between IoTs - Internet of Things and blockchain tech, as well as relationship between AI - Artificial intelligence and blockchain tech. Last but not least authors propose cybersecurity risk solutions and there are policies implications attached.



2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Isha Batra ◽  
Hatem S. A. Hamatta ◽  
Arun Malik ◽  
Mohammed Baz ◽  
Fahad R. Albogamy ◽  
...  

Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative more power. Therefore, this research work proposes a new hybrid lightweight logical security framework for offering security in IoT (LLSFIoT). The operations, key size, and mechanism used in the proposed framework make its lightweight. The proposed framework is divided into three phases: registration, authentication, and light data security (LDS). LDS offers security by using unique keys at each round bearing small size. Key generation mechanism used is comparatively fast making the compromise of keys as a difficult task. These steps followed in the proposed algorithm design make it lightweight and a better solution for IoT-based networks as compared to the existing solutions that are relatively heavy weight in nature.



Author(s):  
Yongjun Zheng ◽  
Haider Ali ◽  
Umair Ullah Tariq


Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Researchers have done tremendous works for data security, but a robust security mechanism is not available yet. Researchers are doing continuous work to build robust SaaS mechanism. SaaS has several security vulnerabilities. Data security is still the most important challenge to researcher and they can constantly do research to protect the data over the network but they are facing numerous technical challenges to completely secure the cloud network and cloud storage. This work would be helpful to understand data security and privacy problems. Researchers can find the new way to understand SaaS security vulnerabilities and currently available solutions.



Sign in / Sign up

Export Citation Format

Share Document