2021
DOI: 10.1007/s12652-020-02700-w
|View full text |Cite
|
Sign up to set email alerts
|

Deep convolutional neural network based secure wireless voice communication for underground mines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
1
0
Order By: Relevance
“…IoT multimedia applications increasingly rely on security as a vital component [16]. The Internet of Things (IoT) is vulnerable to security threats from both applications and humans because the IoT is designed to be able to execute user-implemented applications widely [17]. It is possible to hack into applications and sensors, and hateful people can access the Internet of Things (IoT) and perform violent service assaults.…”
Section: Overview Of Security In a Wireless Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT multimedia applications increasingly rely on security as a vital component [16]. The Internet of Things (IoT) is vulnerable to security threats from both applications and humans because the IoT is designed to be able to execute user-implemented applications widely [17]. It is possible to hack into applications and sensors, and hateful people can access the Internet of Things (IoT) and perform violent service assaults.…”
Section: Overview Of Security In a Wireless Environmentmentioning
confidence: 99%
“…As shown in Equation (17), υ DG k is the one-time usage of a pseudorandom identifier throughout the whole cryptographic transaction R l . In Cipher Block Chaining (CBC) mode, users employed an Advanced Encryption Standard AES with a key length of 128 bits to produce a challenge.…”
Section: Setup Phasementioning
confidence: 99%
“…In addition, Dey et al (2021b) have presented a safe architecture for training the model securely. Similarly, Dey et al (2021c) have introduced a deep network-based secure communication channel in the mining site to secure communication in underground mines. Muduli et al (2019) have conducted a comprehensive survey on deploying wireless sensor network technology in the enclosed region of the mine site.…”
Section: Introductionmentioning
confidence: 99%