Traffic Analysis Using IoT for Improving Secured Communication
Author:
Vejendla Lakshman Narayana1, Naresh Alapati1, Arepalli Peda Gopi1
Affiliation:
1. Vignan's Nirula Institute of Technology and Science for Women, India
Abstract
Internet of things can be simply referred to as internet of entirety, which is the network of things enclosed with software, sensors, electronics that allows them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with unlawful clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, the authors propose a secret IoT architecture for routing in a network. It aims to locate the malicious users in an IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and compared results show the proposed work performs well.
Reference26 articles.
1. Abu Mansour, H. Y., & Elayyan, H. (2018). IoT theme for smart datamining-based environment to unify distributed learning management systems. In 2018 9th International Conference on Information and Communication Systems (ICICS) (pp. 212–217). Academic Press. 2. Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing 3. Sensing and classifying indoor environments: An Iot based portable tour guide system 4. Anderson, G., Burnheimer, A., Cicirello, V., Dorsey, D., Garcia, S., Kam, M., Kopena, J., Malfettone, K., Mroczkowski, A., Naik, G., Peysakhov, M., Regli, W., Shaffer, J., Sultanik, E., Tsang, K., Urbano, L., Usbeck, K., & Warren, J. (2004). Demonstration of the secure wireless agent testbed (swat). In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004 (pp. 1214–1215). Academic Press. 5. Ubiquitous User Assistance in a Tourist Information Server
|
|