Loading…
Security Augmentation Approach for Internet of Things Enhanced Cryptographic Algorithm
The Internet of Things (IoT) is continuously achieving pragmatic attention for research and investigation as this technology have achieved considerable popularity worldwide because of rapidly connecting billions of apparatus to internet and capable enough to make a pragmatic connection among diverse...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The Internet of Things (IoT) is continuously achieving pragmatic attention for research and investigation as this technology have achieved considerable popularity worldwide because of rapidly connecting billions of apparatus to internet and capable enough to make a pragmatic connection among diverse devices for data communication as desired in modern world. Several investigations have been carried out on IoT secrecy in recent years for protecting the confidential data as well as information but due to rapid technological advancements in modern devices as well as communication systems along with new technologies, the protection of the confidential data or information is becoming a critical threat all over globe. In this paper, authors suggested a novel security augmentation approach for IoT utilizing an enhanced cryptographic algorithm that is capable enough to secure confidential data as well as information in faster and pragmatic manner in comparison to the conventional approaches and establish pragmatic connectivity in smart city model as demanded in present era. This experimentation work was carried out over a personal computer (PC) installed with the MATLAB R2019b software kit, 16 GB of RAM (Random Access Memory), Window 10 along with the 64-bit operating system (OS). The measured results were observed with high degree of accuracy and precision for pragmatic validation. The measured outcomes are pragmatic and improved in comparison to diverse kinds of conventional strategies. Although, multifarious investigators have suggested diverse strategies in previous years to improve secrecy of confidentiality data but there are still gigantic possibilities in this arena for more investigation. |
---|---|
ISSN: | 2768-5330 |
DOI: | 10.1109/ICICCS53718.2022.9788160 |