“…U2M communication centers around user actors. Thus, we need to authenticate users, either in a conventional way or sometimes through unconventional means such as biological information [ 32 , 46 , 66 , 77 , 102 , 104 , 117 ] or even forms such as a user’s mental state [ 39 ].…”
Section: Details On Goal-based Taxonomy Perspectivesmentioning
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security. When we design a robust system, it is important to know the available options for facing common tasks related to access control, authentication, and authorization. In this review, we systematically analyze 1622 peer-reviewed publications from October 2017 to December 2020 to find the taxonomy of security solutions. In addition, we assess and categorize current practices related to IoT security solutions, commonly involved technologies, and standards applied in recent research. This manuscript provides a practical road map to recent research, guiding the reader and providing an overview of recent research efforts.
“…U2M communication centers around user actors. Thus, we need to authenticate users, either in a conventional way or sometimes through unconventional means such as biological information [ 32 , 46 , 66 , 77 , 102 , 104 , 117 ] or even forms such as a user’s mental state [ 39 ].…”
Section: Details On Goal-based Taxonomy Perspectivesmentioning
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security. When we design a robust system, it is important to know the available options for facing common tasks related to access control, authentication, and authorization. In this review, we systematically analyze 1622 peer-reviewed publications from October 2017 to December 2020 to find the taxonomy of security solutions. In addition, we assess and categorize current practices related to IoT security solutions, commonly involved technologies, and standards applied in recent research. This manuscript provides a practical road map to recent research, guiding the reader and providing an overview of recent research efforts.
“…A water cycle optimization technique provides a completely random one-time padding key, and the ECG data is encrypted using the Triple Data Encryption Standard (3DES) algorithm. To strengthen security, Selvarani et al [Selvarani P, et al (2019)], using the Cross over mutation technique, the feature value of the fingerprint and iris is extracted and fed into a hybrid Genetic Algorithm and Particle Swarm Optimization algorithm to identify the optimal solution.…”
Section: Triple Data Encryption Standardmentioning
Abstract. Cloud computing is becoming increasingly popular in the IT business because of its higher performance, widespread access, cheap cost, and other benefits. It is also a pay-as-you-go approach; hence, anyone can access cloud data from anywhere, and it is employed in education platforms for online classes due to its ease of use. However, many educational institutions hesitate to use the cloud educational platform due to security and privacy issues. Hence in this study, the performance analysis of various cryptographic algorithms such as Elliptic Curve Cryptography (ECC), Advanced encryption standard (AES), Two Fish, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (TDES) and role-based access control (RBAC) was analyzed and compared with each other in a view to ensuring the protection of cloud data storage used for educational purpose in the NPTEL database. Encryption time, decryption time, and retrieval time with different data sizes were used as performance evaluation factors to figure out the best End-To-End Encryption security in a network system. Moreover, an ElGamal SBO with Delta Competitive NN Cryptography has been proposed in which ElGamal Stag beetle optimization performs ElGamal encryption with the generation of an optimized key with low execution time, thereby allowing only authorized users to access the educational data in the cloud and the data transmission has been secured using Delta Competitive NN that minimizes vulnerable attacks while controlling the decryption activity. Results showed that the proposed ElGamal SBO with Delta Competitive NN Cryptography performs better than all other techniques in terms of retrieval time, encryption time, communication cost, computational overhead and decryption time and hence when applied in a security scenario, it can improve the encryption effectiveness.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.