An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things
نویسندگان
چکیده
Wireless sensors and actuator networks (WSNs) are the physical layer implementation used for many smart applications in this decade form of Internet Things (IoT) cyber-physical systems (CPS). Even though research concerns WSNs have been answered, evolution WSN into an IoT network has exposed it to new technical issues, including data security, multi-sensory multi-communication capabilities, energy utilization, age information. Cluster-based collecting potential address with freshness efficiency. However, may not offer reliable security. This presents improved method sharing cluster head (CH) selection using hybrid Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) conjunction glowworm swarm optimization (GSO) strategies based on energy, trust value, bandwidth, memory security-enabled, cluster-based aggregation IoT. Next, we aggregate after built a genetic algorithm (GA). After aggregation, encrypted delivered securely TIGSO-EDS architecture. Cuckoo search is analyze choose best route sending them. The proposed model’s analysis results analyzed, its uniqueness demonstrated via comparison existing models. reduces consumption each round by 12.71–19.96% increases percentage successfully packets from 2.50% 5.66%.
منابع مشابه
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSecure Information Sharing in an Industrial Internet of Things
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولBayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13020831