2017
DOI: 10.9781/ijimai.2017.438
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Security Mechanisms Based on Clusters IoT Environments

Abstract: -Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…This is good for new applications, or applications that will have a large number of output categories. This is a less common approach because with the large amount of data and rate of learning, these networks typically take days or weeks to train [18].…”
Section: Training From Scratchmentioning
confidence: 99%
“…This is good for new applications, or applications that will have a large number of output categories. This is a less common approach because with the large amount of data and rate of learning, these networks typically take days or weeks to train [18].…”
Section: Training From Scratchmentioning
confidence: 99%
“…IoT has shown a drastic performance in this area and has provided a new direction for the normal life of such people. As these devices and equipment are very cost effective in terms of development cost and easily available within a normal price range, hence most of the people are availing them [6]. Thanks to IoT, as they can live a normal life.…”
Section: Introductionmentioning
confidence: 99%
“…Cloudlets rehashes the contemporary techniques of cloud computing akin virtualization virtual machine abbreviated as VM based [4]{Buyya, 2009, Cloud computing and emerging IT platforms: Vision`, hype`, and reality for delivering computing as the 5th utility}. These are as amenity-affluent servers or clumps of servers positioned at single-hop nearness of the concerned mobile devices.…”
Section: Cloudletmentioning
confidence: 99%