2021
DOI: 10.1155/2021/2330049
|View full text |Cite
|
Sign up to set email alerts
|

Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

Abstract: In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 41 publications
(38 reference statements)
0
11
0
Order By: Relevance
“…Cloud security is one of the hottest area of research, and a large number of approaches have been proposed in the past few decades [7][8][9][10][11]. Identity-based cryptosystem instigated by Shamir [2] where user's identities are used as public key and private key generator (PKG) generates private keys corresponding to their identities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud security is one of the hottest area of research, and a large number of approaches have been proposed in the past few decades [7][8][9][10][11]. Identity-based cryptosystem instigated by Shamir [2] where user's identities are used as public key and private key generator (PKG) generates private keys corresponding to their identities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the previous decade, digital pathology has evolved from the practice of using microscopes equipped with cameras to the digital scanning of complete tissue samples, which is now the standard procedure. In recent years, factors like a significant increase in available processing power, lower-cost storage devices [ 11 ], and significant advancements in image analysis techniques have helped to mainstream computer-aided design (CAD) systems into the everyday routine of pathology labs. For illness detection, diagnosis, and prognosis [ 10 ], these technologies have been developed to complement the judgement of the human expert, that is, the pathologist.…”
Section: Introductionmentioning
confidence: 99%
“…It is a technique for optimizing the performance of computer programmes. This approach is based on the number of fragments used in exploring the inner region of a multidimensional space, and it is very fast [ 35 ]. The primary goal of this iterative approach is to improve the performance of the PI controller's parameters (K p and K i).…”
Section: Proposed Methodologymentioning
confidence: 99%