IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Traffic Analysis Using IoT for Improving Secured Communication

Traffic Analysis Using IoT for Improving Secured Communication
View Sample PDF
Author(s): Lakshman Narayana Vejendla (Vignan's Nirula Institute of Technology and Science for Women, India), Alapati Naresh (Vignan's Nirula Institute of Technology and Science for Women, India)and Peda Gopi Arepalli (Vignan's Nirula Institute of Technology and Science for Women, India)
Copyright: 2021
Pages: 11
Source title: Innovations in the Industrial Internet of Things (IIoT) and Smart Factory
Source Author(s)/Editor(s): Sam Goundar (British University Vietnam, Vietnam), J. Avanija (Sree Vidyanikethan Engineering College, India), Gurram Sunitha (Sree Vidyanikethan Engineering College, India), K. Reddy Madhavi (Sree Vidyanikethan Engineering College, India)and S. Bharath Bhushan (Sree Vidyanikethan Engineering College, Tirupati, India)
DOI: 10.4018/978-1-7998-3375-8.ch008

Purchase

View Traffic Analysis Using IoT for Improving Secured Communication on the publisher's website for pricing and purchasing information.

Abstract

Internet of things can be simply referred to as internet of entirety, which is the network of things enclosed with software, sensors, electronics that allows them to gather and transmit the data. Because of the various and progressively malevolent assaults on PC systems and frameworks, current security apparatuses are frequently insufficient to determine the issues identified with unlawful clients, unwavering quality, and to give vigorous system security. Late research has demonstrated that in spite of the fact that system security has built up, a significant worry about an expansion in illicit interruptions is as yet happening. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments, and enterprises. In this research work, the authors propose a secret IoT architecture for routing in a network. It aims to locate the malicious users in an IoT routing protocols. The proposed mechanism is compared with the state-of-the-art work and compared results show the proposed work performs well.

Related Content

Tanima Sahoo, Arijit Mondal, Piyal Roy, Amitava Podder. © 2024. 20 pages.
Hüseyin Fatih Çetinkaya, Ali Fazıl Yenidünya, Serap Çetinkaya, Burak Tüzün. © 2024. 15 pages.
Digvijay Pandey, Vinay Kumar Nassa, Binay Kumar Pandey, Blessy Thankachan, Pankaj Dadheech, Darshan A Mahajan, A. Shaji George. © 2024. 22 pages.
Loutfy H. Madkour. © 2024. 38 pages.
Loutfy H. Madkour. © 2024. 50 pages.
Rita Komalasari. © 2024. 25 pages.
Aakifa Shahul, Balakumar Muniandi, Mukundan Appadurai Paramashivan, Digvijay Pandey, Binay Kumar Pandey, Pankaj Dadheech, Hovan George. © 2024. 14 pages.
Body Bottom