2018 2nd International Conference on Inventive Systems and Control (ICISC) 2018
DOI: 10.1109/icisc.2018.8398986
|View full text |Cite
|
Sign up to set email alerts
|

A novel report on architecture, protocols and applications in Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 99 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Attempts to introduce new production methods and new combinations of elements have led to new structures. This process of self‐organization, structural adjustment or transformation to other industries is the transformation of the coal industry, including the transformation of industrial organizations and the transformation of the industrial structure 21,22 …”
Section: The Proposed Methodologymentioning
confidence: 99%
“…Attempts to introduce new production methods and new combinations of elements have led to new structures. This process of self‐organization, structural adjustment or transformation to other industries is the transformation of the coal industry, including the transformation of industrial organizations and the transformation of the industrial structure 21,22 …”
Section: The Proposed Methodologymentioning
confidence: 99%
“…Anguraj, et al [3] proffered a "Trust-based intrusion detection and clustering approach for wireless body area networks." Kumar, R. et al [4] explains the "A novel report on architecture, protocols and applications in Internet of Things (IoT)." Anand, J. V et al [5] has proposed the "Design and Development of Secure and Sustainable Software Defined Networks" Neelaveni, R. et al [6] designed a "Security Assistance for VANET Using Cloud Computing and evaluated its performance" Mugunthan, S. R. et al [7] in his paper has performed the procedure of "Security and Privacy Preserving of Sensor Data Localization Based on Internet of Things."…”
Section: Related Workmentioning
confidence: 99%
“…The employment of the Light weight cryptography in the IOT information exchange enhances the efficiency in the end to end communication by activating an end to end security [18][19][20], ensures a lower power consumption and lower foot print of the cryptographic primitives compared to the conventional cryptography. The proposed method could be very effective in the industrial plants, health care and other applications where a protection for the personal information is necessitated.…”
Section: Table2 Twine and Aes Descriptionmentioning
confidence: 99%