A Secure Convergence of Data Transmission and Intelligent Authentication Using a Sensing Approach for the Internet of Thing

Author:

Irshad Reyazur Rashid1,Ahmad Sultan2,Alattab Ahmed Abdu1,Alzupair Ahmed Abdallah Ahmed1,Bin-Habtoor Abdulaziz Saleh Yeslem3,Imran Mohammad4,Abdallah Norain Khalid Ahmed1

Affiliation:

1. Department of Computer Science, College of Science and Arts, Sharurah, Najran University, Sharurah 68341, Kingdom of Saudi Arabia

2. Department of Computer Science, College of Computer Engineering & Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia

3. Department of Computer Network & Communications, Department of Electronic and Communication, College of Engineering and Petroleum, Hadhramout University, Hadhramout-50512, Yemen

4. Department of Computer Science, SJJT University, Jhunjhunu 333001, Rajasthan, India

Abstract

The IoT’s millions of sensor-equipped gadgets upload data to computers for management and use in smart grids, intelligent transportation networks, healthcare networks, and smart cities. Sensor data needs a safe server-sensor connection. Studying altered data could have catastrophic consequences. Internet-of-Things sensors must authenticate with the reader and base station before sending data. IoT sensors can securely and effectively communicate data. Correction evidence in the suggested technique reveals that the required data is created at the receiver using the normal Euclidean parameters of IoT sensors. The proposed approach is compatible with most assaults, making it a good security option. A framework for edge IoT devices can optimize latency, security, and other performance characteristics. Constraints Application Protocol (COAP) and The Stream Control Transmission Protocol (AESCQTTP) combine cooperative resource management, machine learning, context-aware computing, and flexible infrastructure to handle communication and computing difficulties. To reduce end-to-end latency by (7.13–7.35)%, raise security by 98.99%, and increase efficient pocket distribution to 98%. This study examined existing research issues and edge-computing technologies and proposed a novel strategy for optimizing edge-IoT system performance metrics. This arrangement could let future networks communicate securely.

Publisher

American Scientific Publishers

Subject

Electrical and Electronic Engineering,Electronic, Optical and Magnetic Materials

Reference31 articles.

1. Analysis of authentication techniques in internet of things (IoT);El-hajj,2017

2. Internet of things (IoT). IOT agenda;Rouse,2019

3. Electric, Electronic and Control Engineering

4. A review of smart home applications based on internet of things;Alaa;Journal of Network and Computer Applications,2017

5. A review of Internet of Things for smart home: Challenges and solutions;Stojkoska;Journal of Cleaner Production,2017

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3