Proceedings ArticleDOI
Multi key distribution scheme by diophantine form for secure IoT communications
Chandrasegar Thirumalai,Sathish Shanmugam +1 more
- pp 1-5
Reads0
Chats0
TLDR
This paper aims to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices, which have a minimal amount of processing capabilities.Abstract:
IoT devices are everywhere. Shortly, every “thing” is going to be connected and interact with each other. What are these things? They can be your microwaves, heaters, air conditioners or even your refrigerators. It assessed that there would be 50 billion connected IoT devices by 2020 which is about 7 IoT gadgets for every individual on the planet. IoT devices are low powered devices which have a minimal amount of processing capabilities. With ever increasing number of IoT devices, there is a subsequent need for secure communication among them. In this paper, we aim to propose an encryption algorithm used for secure communication by taking into account the limitations of IoT devices.read more
Citations
More filters
Proceedings ArticleDOI
Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices
TL;DR: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme, which reuses the RSA scheme with a Diophantine form of the nonlinear equation for memory efficiency and performs well.
Proceedings ArticleDOI
Decision making system using machine learning and Pearson for heart attack
TL;DR: This informational collection is utilized to anticipate the odds of an event of heart assault for a patient and the total number of attributes is brought into a small figure so that the patient may be able to choose which property can be considered and which characteristic can be disregarded.
Proceedings ArticleDOI
Data analysis using box and whisker plot for lung cancer
TL;DR: This work is going to implement boxplot method and control chart methods for Lung cancer dataset with the help of boxplot, which can easily make relations between samples and find the outliers.
Proceedings ArticleDOI
Analysis of cost estimation function for facebook web click data
TL;DR: Gephi tool in this project is used for Social Network Analysis of Facebook Pages and is used to find metrics like Modularity, Average Weighted Degree, Average Degree etc.
Proceedings ArticleDOI
Data analysis using box plot on electricity consumption
TL;DR: Based on the Spearman similarity measure the attribute are analyzed using boxplot as discussed by the authors in this real-time data of Australian energy market operator, data dashboard in national electricity market provides the average price history of few years.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Dual RSA and Its Security Analysis
TL;DR: New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Journal ArticleDOI
New efficient and practical verifiable multi-secret sharing schemes
TL;DR: This paper proposes two efficient, computationally secure (t,n), and verifiable multi-secret sharing schemes based on homogeneous linear recursion that have the advantage of better performance, a new simple construction and various techniques for the reconstruction phase.
Proceedings ArticleDOI
Harbor: software-based memory protection for sensor nodes
TL;DR: Harbor as mentioned in this paper is a memory protection system that prevents many forms of memory corruption by using software based fault isolation to restrict application memory accesses and control flow to protection domains within the address space.