12 research outputs found

    New Approach to Implement Authentication and Key Distribution on WI-Max Networks

    Get PDF
    Wi-Max is utilized for the remote system. This innovation will be a developing innovation for remote innovation in future. It is like Wi-Fi however its territory of scope and transfer speed is considerably higher than the Wi-Fi. So the security turns out to be vital issue. Wi-Max innovation incorporates some security components, for example, Key administration, Authentication and privacy. For security first need is crosswise over remote system and other is to give get to control to the system and the get to control can be given utilizing access control conventions. Major issues are in WiMax difficult to handle the security problems. In this paper proposed implementing authentication and distribution of keys in secure manner on open networks and also providing confidentiality

    Energy-Efficient Cluster-based Routing Protocol in Internet of Things Using Swarm Intelligence

    Full text link
    © 2020 IEEE. Energy conservation is a difficult challenge, because the Internet of Things (IoT) connects limited resource devices. Clustering is an efficient method for energy saving in network nodes. The existing clustering algorithms have problems with the short lifespan of a network, an unbalanced load among the network nodes and increased end-to-end delays. This paper proposes a new Cluster Head (CH) selection and cluster formation algorithm to overcome these issues. The process has two phases. First, the CH is selected using a Swarm Intelligence Algorithm called Sailfish optimization Algorithm (SOA). Second, the cluster is formed by the Euclidean distance. The simulation is conducted using the NS2 simulator. The efficacy of the SOA is compared to Improved Ant Bee Colony optimization-based Clustering (IABCOCT), Enhanced Particle Swarm optimization Technique (EPSOCT) and Hierarchical Clustering-based CH Election (HCCHE). The final results of the simulation show that the proposed SOA improves network life and decreases node-to-sink delays

    A WiVi Based IoT Framework for Detection of Human Trafficking Victims Kept in Hideouts

    Full text link
    © 2020, Springer Nature Switzerland AG. Human trafficking is the trade of humans for the purpose of forced labor, sexual slavery, or commercial sexual exploitation for the trafficker or others. The traffickers often trick, defraud, or physically force victims into selling sex and forced labor. In others, victims are lied to, assaulted, threatened, or manipulated into working under inhumane, illegal, or otherwise unacceptable conditions. According to the estimation of the International Labor Organization, there are more than 40.3 million victims of human trafficking globally. It is a threat to the Nation as well as to humanity. There have been many efforts by government agencies & NGOs to stop human trafficking and rescuing victims, but the traffickers are getting smarter day by day. From multiple sources, it is observed that the traffickers generally hide humans in hidden rooms, sealed containers, and boxes disguised as goods. This congestion results in Critical mental and physical damages in some cases. It is practically impossible to physically go and check each box, containers or rooms. So in this paper, we propose an Wireless Vision based IoT framework, which uses the reflection of WiFi radio waves generated by WiFi to detect the presence of humans inside a cement or metal enclosure from outside

    Addressing Security and Privacy Issues of IoT Using Blockchain Technology

    Full text link
    Internet of Things (IoT) has been the most emerging technology in the last decade because the number of smart devices and its associated technologies has rapidly grown in both industrial and research prospectives. The applications are developed using IoT techniques for real-time monitoring. Due to low processing power and storage capacity, smart things are vulnerable to the attacks as existing security or cryptography techniques are not suitable. In this study, we initially review and identify the security and privacy issues that exist in the IoT system. Second, as per blockchain technology, we provide some security solutions. The detailed analysis, including enabling technology and integration of IoT technologies, is explained. Finally, a case study is implemented using the Ethererum-based blockchain system in a smart IoT system and the results are discussed

    Authentication and Key Management in Distributed IoT using Blockchain Technology

    Full text link

    Detecting Product Review Spammers Using Principles of Big Data

    Full text link
    corecore