3 research outputs found

    Analysis of Data Aggregation Techniques of IOT

    Get PDF
    The internet of things is the self configuring network in which sensor nodes can join or leave the network when they want. The security, data aggregation are the two major issues of IOT. In the previous years various techniques are designed to improve data aggregation rate of IOT. The clustering is the technique which can increase data aggregation rate and reduce lifetime of the network. In this paper, various techniques are reviewed to improve lifetime of the network and increase data aggregation rate

    A Novel Context Aware Privacy Provision Algorithm for Hand Held Devices

    Get PDF
    Context-awareness is an emerging area in the current technical world as it adapts mechanisms and interfaces of applications based on consumer preferences as well as the environmental conditions. Various applications of Internet of Things can be perceived in the fields such as but not limited to agriculture, Industry, Medical and Healthcare, Smart Home Appliances, etc. Since last couple of decades use of mobile devices have grown tremendously everywhere in this world. Adding computing capabilities has increased their application to many folds and has made task as well as life simpler than earlier days. These smart-phone embedded with computing features have become an integral part of daily life of people globally. Unprecedented rates of growth were noticed in use of mobile applications on these handheld devices. But adding to the wows, subscribers are usually requested to provide personal and context data, while making use of these mobile utilities. The permission have to be given to access the user location, the contact details as well as the gallery of the mobile storage whenever the new application have to be installed. Due to these conditions applied by the application providers the privacy concern came into being for security experts and organizations. In order to render better services to the users, privacy is an important concern employed. The privacy is enhanced in the context aware applications through the proposed encryption strategies to offer efficient services. In the proposed approach, an active encryption strategies are employed for enhancing the network security.&nbsp

    Making the Internet of Things More Reliable Thanks to Dynamic Access Control

    Get PDF
    While the Internet-of-Things (IoT) infrastructure is rapidly growing, the performance and correctness of such systems becomes more and more critical. Together with flexibility and interoperability, trustworthiness related aspects, including security, privacy, resilience and robustness, are challenging goals faced by the next generation of IoT systems. In this chapter, we propose approaches for IoT tailored access control mechanisms that ensure data and services protection against unauthorized use, with the aim of improving IoT system trustworthiness and lowering the risks of massive-scale IoT-driven cyber-attacks or incidents.acceptedVersio
    corecore