Post harvesting Onion Storage Methodology Using IOT
نویسندگان
چکیده
منابع مشابه
Post-Quantum Secure Onion Routing
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous users and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this ...
متن کاملPost-Quantum Forward-Secure Onion Routing
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous user and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this p...
متن کاملLearning-Based Computation Offloading for IoT Devices with Energy Harvesting
Internet of Things (IoT) devices can apply mobileedge computing (MEC) and energy harvesting (EH) to provide the satisfactory quality of experiences for computation intensive applications and prolong the battery lifetime. In this article, we investigate the computation offloading for IoT devices with energy harvesting in wireless networks with multiple MEC devices such as base stations and acces...
متن کاملPoster: Multi-source Energy Harvesting for IoT nodes
Power consumption is a primary concern for wireless sensor networks. In order to reduce the use of batteries in the nodes, energy harvesting technologies have been considered. However, most of the existing solutions rely on a single energy source, thus potentially reducing the sensor sustainability. In this paper, we present a circuit that switches between multiple heterogeneous energy sources,...
متن کاملHarvested Energy-adaptive Mac Protocol for Energy Harvesting Iot Networks
In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2019
ISSN: 2319-5940,2278-1021
DOI: 10.17148/ijarcce.2019.8504