2019
DOI: 10.1080/1206212x.2019.1619277
|View full text |Cite
|
Sign up to set email alerts
|

An efficient approach for enhancing security in Internet of Things using the optimum authentication key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…The increase in the number of devices, applications, and parties increases the risk of data compromise. Integrity ensures the health data offered to any entity or captured via a system are consistent and accurate through the intended information and not modified in any method [ 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. E-health cloud requires high reliability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The increase in the number of devices, applications, and parties increases the risk of data compromise. Integrity ensures the health data offered to any entity or captured via a system are consistent and accurate through the intended information and not modified in any method [ 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. E-health cloud requires high reliability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e combination of variation with selection and crossover ensures the effectiveness of the genetic algorithm and improves the search efficiency of the algorithm. e current early-warning methods of finance companies are too old, the financial information used in univariate early warning is rather one-sided, and the accuracy of earlywarning results is not high [20][21][22][23][24]. First of all, univariate early warning is not combined with a certain theoretical basis, it mainly relies on the subjective judgment of finance personnel in selecting indicators and risk evaluation, and there is also a problem of poor consideration for the comprehensiveness of the selected indicators, which will lead to the lack of credibility of the early-warning results.…”
Section: Financing Risk Investment Riskmentioning
confidence: 99%
“…Other related research has been dedicated to the authentication architecture used to secure IoT-based cloud computing systems used for smart innovation, technology development, environment simulations and various educational applications [44,47,48]. In addition, Kalyani and Chaudhari [56] presented an efficient approach for enhancing security in IoT-based by using the optimum authentication key. The enhances IoT security authentication by utilizing cryptographic-based methodologies to secure IoT sensitive data with the help of optima homomorphic encryption with high dependability.…”
Section: Security Requirements For Iot-cloud-based E-health Systemsmentioning
confidence: 99%