Device classification based data encryption for internet of things

Author(s):  
T.P. Sharma ◽  
N.A. Rishabh
Author(s):  
Xiuming Yu ◽  
Ping Zhou ◽  
Shaoyong Guo ◽  
Zijian Chang

2020 ◽  
Vol 17 (1) ◽  
pp. 118-131 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Bassem Abd-El-Atty ◽  
Wojciech Mazurczyk ◽  
Carol Fung ◽  
Salvador E. Venegas-Andraca

2013 ◽  
Vol 469 ◽  
pp. 322-325 ◽  
Author(s):  
Zhi Qiang Gao ◽  
Xiu Ping Zhao

The Internet of Things technology used in agricultural products, such as food safety traceability management is taking the technological advantages of the Internet of Things RFID (Radio Frequency IDentification) is non-contact automatic fast read and write data encryption, in order to achieve a unified management and efficient flow of work in coordination.This thesis reports a production method of conductive nanosilver jet ink. The ink can be used to directly print RFID antenna coil. In the method using silver nitrate as silver source, hydrazine hydrate as a reducing agent, polyvinyl pyrrolidone as a protective agent. Obtain the dispersion of silver nanoparticles through chemical reduction reaction. The dispersion was purified and used inkjet printer into a graphic on glossy photo paper, after 180 °C sintered for 15 minutes with good conductivity, RFID antennas to meet requirements.


Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.


2022 ◽  
pp. 571-601
Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.


2020 ◽  
Vol 16 (3) ◽  
pp. 155014772091100
Author(s):  
Yuan Gao ◽  
Hequn Xian ◽  
Aimin Yu

Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications. In order to ensure data security for deduplication, different data should be assigned with different privacy levels. We propose a deduplication scheme based on threshold dynamic adjustment to ensure the security of data uploading and related operations. The concept of the ideal threshold is introduced for the first time, which can be used to eliminate the drawbacks of the fixed threshold in traditional schemes. The item response theory is adopted to determine the sensitivity of different data and their privacy score, which ensures the applicability of data privacy score. It can solve the problem that some users care little about the privacy issue. We propose a privacy score query and response mechanism based on data encryption. On this basis, the dynamic adjustment method of the popularity threshold is designed for data uploading. Experiment results and analysis show that the proposed scheme based on threshold dynamic adjustment has decent scalability and practicability.


Sign in / Sign up

Export Citation Format

Share Document