2021
DOI: 10.17762/ijritcc.v9i3.5476
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study and Design Light Weight Data Security System for Secure Data Transmission in Internet of Things

Abstract: Internet of things is shortened as IoT. Today IoT is a key and abrogating subject of the specialized and social importance. Results of buyers, things and vehicles, industry based and fundamental segments, sensors, and other everyday items are converged with network of internet and the solid information abilities which guarantee to change the sort in which we work and live. The proposed work demonstrates the implementation of symmetric key lightweight algorithm for secured data transmission of images and text u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Lin proposed that knowledge and information will be obtained from the collection and analysis of complex and huge digital data to improve the ability [11]. Jadaun et al said that India, with the second largest population in the world, has also actively used big data in recent years, hoping to create a more convenient and people-friendly smart and civilized city [12]. As early as a few years ago, in the plans of the British government and the Japanese government, big data became one of the key decisions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lin proposed that knowledge and information will be obtained from the collection and analysis of complex and huge digital data to improve the ability [11]. Jadaun et al said that India, with the second largest population in the world, has also actively used big data in recent years, hoping to create a more convenient and people-friendly smart and civilized city [12]. As early as a few years ago, in the plans of the British government and the Japanese government, big data became one of the key decisions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The most popular IoT devices used in the simulations are the Arduino Mega 2560 and Raspberry Pi 3. Jadaun, A., Alaria, S. K., & Saini, Y [18] suggested the establishment of a symmetric key LWC algorithm for secure data transmission of text and images utilizing a reversible data hiding system and an image encryption system. A graphical user interface was utilized in the design of the suggested symmetric cryptographic key.…”
Section: Literature Reviewmentioning
confidence: 99%
“…After negotiating using a smart contract, a real data contract (RDC) is created and issued through a smart contract. A content producer or service provider can easily implement a trading strategy under a predefined smart contract [ 9 ]. In the industrial Internet of things (IIoT), energy transactions of decentralized nodes occur in various scenarios, such as microgrid, energy collection network, and vehicle to grid network.…”
Section: Related Workmentioning
confidence: 99%