2018
DOI: 10.1155/2018/3680851
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things

Abstract: Internet of Things (IoT) is a research field that has been continuously developed and innovated in recent years and is also an important driving force for the improvement of people’s life in the future. There are lots of scenarios in IoT where we need to collaborate through devices to complete tasks; that is, a device sends data to other devices, and other devices operate on the aid of the data. These transmitted data are often users’ privacy data, such as medical data and grid data. We propose an instant encr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(27 citation statements)
references
References 32 publications
0
27
0
Order By: Relevance
“…We need to send users' data to clouds and guarantee the security of users data while ensuring rapid transmission of instant data [32,33] and the security of public storage clouds [34,35]. Note that mining data from multiple data sources to extract useful information [36,37] for better understanding of security risk evaluation should be considered in the future study.…”
Section: Discussionmentioning
confidence: 99%
“…We need to send users' data to clouds and guarantee the security of users data while ensuring rapid transmission of instant data [32,33] and the security of public storage clouds [34,35]. Note that mining data from multiple data sources to extract useful information [36,37] for better understanding of security risk evaluation should be considered in the future study.…”
Section: Discussionmentioning
confidence: 99%
“…In their attack, four-byte faults are not under discussion since four-byte faults hardly appear in real attacks. The occurrence rate of the fault type is denoted as , t denotes the number of faulty bytes, and ∈ [1,3]. The notations used are provided in Table 1.…”
Section: Dfa Methods Proposed By Nan Liao Et Almentioning
confidence: 99%
“…There are lots of scenarios in IoT where people have to collaborate through devices to complete tasks; for example, a device sends data to other devices [1], or one user shares EHR in mobile cloud computing [2], and these transmitted data are often the privacy data of users. At the same time, in the big data environment [3,4], many enterprises need to constantly assimilate big data knowledge and private knowledge by multiple knowledge transfers to maintain their competitive advantage [5].…”
Section: Introductionmentioning
confidence: 99%
“…Since BTC has flourished, Blockchain, the technology that underpins BTC, could, according to Swan, have far-ranging consequences for all aspects of modern society. Based on the characteristics of Blockchain, many researchers have carried out research on its application in the IoT environment [21], such as applying BC to the smart home system to ensure the security and privacy of information [22], applying smart contract in IoT [23], using the BC platform to manage IoT devices [24], and made security transmission for IoT [25]. The reason for this explosion of interest is that, with the Blockchain technology in place, applications that could previously run only through a trusted intermediary can now operate in a decentralized fashion.…”
Section: Related Workmentioning
confidence: 99%