scispace - formally typeset
Proceedings ArticleDOI

Multi key distribution scheme by diophantine form for secure IoT communications

Reads0
Chats0
TLDR
This paper aims to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices, which have a minimal amount of processing capabilities.
Abstract
IoT devices are everywhere. Shortly, every “thing” is going to be connected and interact with each other. What are these things? They can be your microwaves, heaters, air conditioners or even your refrigerators. It assessed that there would be 50 billion connected IoT devices by 2020 which is about 7 IoT gadgets for every individual on the planet. IoT devices are low powered devices which have a minimal amount of processing capabilities. With ever increasing number of IoT devices, there is a subsequent need for secure communication among them. In this paper, we aim to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices.

read more

Citations
More filters
Proceedings ArticleDOI

Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices

TL;DR: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme, which reuses the RSA scheme with a Diophantine form of the nonlinear equation for memory efficiency and performs well.
Proceedings ArticleDOI

Decision making system using machine learning and Pearson for heart attack

TL;DR: This informational collection is utilized to anticipate the odds of an event of heart assault for a patient and the total number of attributes is brought into a small figure so that the patient may be able to choose which property can be considered and which characteristic can be disregarded.
Proceedings ArticleDOI

Data analysis using box and whisker plot for lung cancer

TL;DR: This work is going to implement boxplot method and control chart methods for Lung cancer dataset with the help of boxplot, which can easily make relations between samples and find the outliers.
Proceedings ArticleDOI

Analysis of cost estimation function for facebook web click data

TL;DR: Gephi tool in this project is used for Social Network Analysis of Facebook Pages and is used to find metrics like Modularity, Average Weighted Degree, Average Degree etc.
Proceedings ArticleDOI

Data analysis using box plot on electricity consumption

TL;DR: Based on the Spearman similarity measure the attribute are analyzed using boxplot as discussed by the authors in this real-time data of Australian energy market operator, data dashboard in national electricity market provides the average price history of few years.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Dual RSA and Its Security Analysis

TL;DR: New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Journal ArticleDOI

New efficient and practical verifiable multi-secret sharing schemes

TL;DR: This paper proposes two efficient, computationally secure (t,n), and verifiable multi-secret sharing schemes based on homogeneous linear recursion that have the advantage of better performance, a new simple construction and various techniques for the reconstruction phase.
Proceedings ArticleDOI

Harbor: software-based memory protection for sensor nodes

TL;DR: Harbor as mentioned in this paper is a memory protection system that prevents many forms of memory corruption by using software based fault isolation to restrict application memory accesses and control flow to protection domains within the address space.
Related Papers (5)