2019
DOI: 10.3390/sym11030361
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment

Abstract: The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…Symmetry-Adapted Machine Learning for Information Security delivers successfully accepted submissions [1][2][3][4][5][6][7][8][9][10][11][12] in this Special Issue of Symmetry. Proposals for several innovative paradigms, novel architectural designs, and frameworks with symmetry-adapted machine learning are covered in this particular issue.…”
Section: Symmetry-adapted Machine Learning For Information Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Symmetry-Adapted Machine Learning for Information Security delivers successfully accepted submissions [1][2][3][4][5][6][7][8][9][10][11][12] in this Special Issue of Symmetry. Proposals for several innovative paradigms, novel architectural designs, and frameworks with symmetry-adapted machine learning are covered in this particular issue.…”
Section: Symmetry-adapted Machine Learning For Information Securitymentioning
confidence: 99%
“…Lee at al. [5] present a symmetry protocol for the efficient operation of IP cameras in the IoT environment. The authentication protocol is intended to serve in heterogeneous networks as a lightweight security solution.…”
Section: Symmetry-adapted Machine Learning For Information Securitymentioning
confidence: 99%