2023
DOI: 10.1108/ijpcc-12-2021-0300
|View full text |Cite
|
Sign up to set email alerts
|

Optimized security algorithm for connected vehicular network

Abstract: Purpose As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls. Design/methodology/approach IoT technology would be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…However, the security and privacy are not well established in this process. So, by using flora artificial optimization algorithm, authentication and public keys are generated in a safer manner, and hence the security for the user information becomes part of MAC header (Choudhary, 2023).…”
Section: Introductionmentioning
confidence: 99%
“…However, the security and privacy are not well established in this process. So, by using flora artificial optimization algorithm, authentication and public keys are generated in a safer manner, and hence the security for the user information becomes part of MAC header (Choudhary, 2023).…”
Section: Introductionmentioning
confidence: 99%