Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology

Author:

Savithri M.1,Pradeepa M.2,Prasad D. Rajendra3,Gangodkar Durgaprasad4,Rajalakshmi R.5,Shafi Shaik6,Sinchana N. M.7,Prasanna Kumar K. R.7,Selvam Nagarajan8ORCID

Affiliation:

1. Department of Computer Science, Dr. N.G.P. Arts and Science College, 641048, Coimbatore, Tamilnadu, India

2. School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632 014, India

3. Department of Electronics and Communication Engineering, St. Ann's College of Engineering & Technology, Chirala, Andhra Pradesh 523187, India

4. Department of Computer Science & Engineering, Graphic Era Deemed to Be University, Uttarakha, Nd 248002, Dehradun, India

5. Department of Electronics & Communication Engineering, Ramco Institute of Technology, Rajapalayam, Tamilnadu 626117, Virudhunagar, India

6. Department of Electronics and Communication Engineering, BV Raju Institute of Technology, Narsapur, Medak, Telangana 502313, India

7. Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka 572103, India

8. Department of Computer Science, Ambo University, Ethiopia

Abstract

In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3